Bug 35677 - Trust ca-certificate Root-CAs
Trust ca-certificate Root-CAs
Status: RESOLVED WONTFIX
Product: UCS
Classification: Unclassified
Component: Mail
UCS 4.1
Other Linux
: P5 enhancement (vote)
: ---
Assigned To: Mail maintainers
:
Depends on: 35611
Blocks:
  Show dependency treegraph
 
Reported: 2014-08-21 11:08 CEST by Janis Meybohm
Modified: 2019-01-03 07:19 CET (History)
2 users (show)

See Also:
What kind of report is it?: Bug Report
What type of bug is this?: 3: Simply Wrong: The implementation doesn't match the docu
Who will be affected by this bug?: 3: Will affect average number of installed domains
How will those affected feel about the bug?: 1: Nuisance – not a big deal but noticeable
User Pain: 0.051
Enterprise Customer affected?: Yes
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number: 2014081321000306
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Janis Meybohm univentionstaff 2014-08-21 11:08:31 CEST
Ticket#: 2014081321000306

We should configure Postfix to trust default root CAs provided by "ca-certificates" package to avoid "certificate verification failed" messages in mail.log when using external mail relays.

In /etc/postfix/main.cf:

smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt

_or_

smtp_tls_CApath = /etc/ssl/certs/
Comment 1 Stefan Gohmann univentionstaff 2019-01-03 07:19:08 CET
This issue has been filled against UCS 4.1. The maintenance with bug and security fixes for UCS 4.1 has ended on 5st of April 2018.

Customers still on UCS 4.1 are encouraged to update to UCS 4.3. Please contact
your partner or Univention for any questions.

If this issue still occurs in newer UCS versions, please use "Clone this bug" or simply reopen the issue. In this case please provide detailed information on how this issue is affecting you.