diff options
author | barner <barner@FreeBSD.org> | 2005-12-10 22:51:45 +0000 |
---|---|---|
committer | barner <barner@FreeBSD.org> | 2005-12-10 22:51:45 +0000 |
commit | c03f9390fadf8d740f0c39b6b695b3b5c4fb606b (patch) | |
tree | 29c6e5c186b4a1981e4dc8c2b42a568e25451225 /UPDATING | |
parent | a6ebc8fb6534da15ed5f46eb6e4fdde7357199a5 (diff) | |
download | FreeBSD-ports-c03f9390fadf8d740f0c39b6b695b3b5c4fb606b.zip FreeBSD-ports-c03f9390fadf8d740f0c39b6b695b3b5c4fb606b.tar.gz |
Add instructions for mail/fetchmail users how to configure certificates in
order to avoid verbose warnings that appeared with fetchmail 6.3.0.
Diffstat (limited to 'UPDATING')
-rw-r--r-- | UPDATING | 29 |
1 files changed, 29 insertions, 0 deletions
@@ -6,6 +6,35 @@ You should get into the habit of checking this file for changes each time you update your ports collection, before attempting any port upgrades. +20051210: + AFFECTS: users of mail/fetchmail using SSL encryption + AUTHOR: barner@FreeBSD.org + + Fetchmail now checks the validity of server certificates and complains + verbosely in maillog if the validation fails. + + If your mail server's certificate is not signed by one of the root + authorities, you have to manually configure them using the following steps: + + * Download the necessary certificates in PEM format and store them + at a suitable location, e.g. /home/user/.certs + + * Run the c_rehash tool on the freshly installed certificates: + + - If you are using OpenSSL from the base system (this is the default) + use the following command: + % perl /usr/src/crypto/openssl/tools/c_rehash /home/user/.certs + + - If you are using OpenSSL from security/openssl please use + % c_rehash /home/user/.certs + + * Use the following options to enable SSL encryption your .fetchmailrc + configuration file: + + options ssl sslcertpath /home/user/.certs sslcertck + sslfingerprint '< fingerprint >' + < other options > + 20051208: AFFECTS: users of net/py-bittorrent and net/py-bittorrent-core AUTHOR: lioux@FreeBSD.org |