2009/1/24 Dale Gallagher <dale.gallag...@gmail.com>:
> 2009/1/23 Ask Bjørn Hansen <a...@develooper.com>:
>>
>> On Jan 23, 2009, at 4:41, John Peacock wrote:
>>
>>> From a quick google, I think the solution is that you have to include the
>>> certificate chain in the same file as the server cert itself, in reverse
>>> order
>>> (so the CA is first, followed by any intermediate CA's, and the server
>>> cert is
>>> last).
>>
>>
>> Yeah - that's how it works in Perlbal (which is using similar-ish code).
>
> I've tried that and various other combinations, but nothing seems to
> work. See below. It's crazy that setting up with chained certs is so
> troublesome, as there seems to be a trend towards only using chained
> certs.
>
> Certs I have:
>
>  server.key (server private key)
>  server.crt (signed server cert)
>  DigiCertCA.crt (intermediate cert)
>  TrustedRoot.crt (root cert)

Ok, the truth is somewhere inbetween! I was getting errors while using
the Sylpheed mail client, which I'd installed to test. It seems it may
not have a built-in list of root certs. The following works with both
Thunderbird and Opera mail clients.

For the above list of DigiCert certs (SSL WildCard Cert), the solution is:

1. Create cert-bundle.pem

  This is not in reverse order as per John's post, but server cert first,
  intermediate cert second and trusted root last.

  cat /path/to/server.crt /path/to/DigiCertCA.crt
/path/to/TrustedRoot.crt > cert-bundle.pem

2. Configure the 'tls' line in ./config/plugins

  tls /path/to/cert-bundle.pem /path/to/server.key /path/to/DigiCertCA.crt

There are so many variations in how different applications/servers
read certs that it becomes rather confusing!

Thanks for all the responses.
Dale

Reply via email to