CA installed and working for OpenSSL but fails with Email app [answered]
Hi,
I am trying to get my email to work without having to accept untrusted certificates. I have installed my root CA cert as described here.
Testing the root CA cert with openssl verify
returns OK.
Testing with openssl s_client -connect myserver.net -CApath /etc/pki/tls/certs
is successful as well - connection established and the cert checks return no error codes.
Still, when I try to set up the email account, it fails and asks me to 'Check certificate'
There seem to exist multiple cert storages on the jolla, possibly I need to add the root certs elsewhere as well? Is it documented anywhere what is the purpose of having what seems to be identical certs in /etc/ssl/certs and /etc/pki/tls/certs?
Edit: Ultimately (and much more briefly put) the question is what cert store does the Email app use?
+! I have the same problem
ortylp ( 2014-09-16 21:21:57 +0200 )editAre you sure entire chain is trusted ? Check with:
VDVsx ( 2014-09-19 15:30:00 +0200 )editI use self signed cert so there is not really a chain. I have imported the same cert into Android (on SG Note with CM) and it worked there.
I think the best policy is what each SSH client uses, and wha t K9 implements in regards to certificates: show the certificate to the user for confirmation on first use and then trust it until configuration changes or gets cleared.
ortylp ( 2014-09-19 18:30:46 +0200 )editIt seems my work email provider has distributed server system, where not all servers in their workload farm send also the intermediate certificate during TLS handshake. This was easy to confirm by repeatedly performing
Direc ( 2015-06-27 21:27:44 +0200 )editcurl -kIv1 https://example.com
and getting eitherSSL certificate verify ok.
orSSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
The only way to get rid of email app cover error message (check account or something close to that, I use Finnish) was to actually add the often-missing certificate to
/etc/pki/tls/certs/ca-bundle.crt
The other certificates in that file include the "verbal" part too, but that's just for the humans reading the file, right?