aboutsummaryrefslogtreecommitdiff
path: root/UPDATING
diff options
context:
space:
mode:
authorSimon Barner <barner@FreeBSD.org>2005-12-10 22:51:45 +0000
committerSimon Barner <barner@FreeBSD.org>2005-12-10 22:51:45 +0000
commit30ac01d9f286d3f648eb1028064bcf4408371766 (patch)
treeb73e6c92d62acea59bdbe45985c718da6bf6ae81 /UPDATING
parent351df0179529f0aa42a0fad5ac405eb5e9fc5859 (diff)
downloadports-30ac01d9f286d3f648eb1028064bcf4408371766.tar.gz
ports-30ac01d9f286d3f648eb1028064bcf4408371766.zip
Notes
Diffstat (limited to 'UPDATING')
-rw-r--r--UPDATING29
1 files changed, 29 insertions, 0 deletions
diff --git a/UPDATING b/UPDATING
index 0ba29ef61ba1..108266d85d48 100644
--- a/UPDATING
+++ b/UPDATING
@@ -6,6 +6,35 @@ You should get into the habit of checking this file for changes each
time you update your ports collection, before attempting any port
upgrades.
+20051210:
+ AFFECTS: users of mail/fetchmail using SSL encryption
+ AUTHOR: barner@FreeBSD.org
+
+ Fetchmail now checks the validity of server certificates and complains
+ verbosely in maillog if the validation fails.
+
+ If your mail server's certificate is not signed by one of the root
+ authorities, you have to manually configure them using the following steps:
+
+ * Download the necessary certificates in PEM format and store them
+ at a suitable location, e.g. /home/user/.certs
+
+ * Run the c_rehash tool on the freshly installed certificates:
+
+ - If you are using OpenSSL from the base system (this is the default)
+ use the following command:
+ % perl /usr/src/crypto/openssl/tools/c_rehash /home/user/.certs
+
+ - If you are using OpenSSL from security/openssl please use
+ % c_rehash /home/user/.certs
+
+ * Use the following options to enable SSL encryption your .fetchmailrc
+ configuration file:
+
+ options ssl sslcertpath /home/user/.certs sslcertck
+ sslfingerprint '< fingerprint >'
+ < other options >
+
20051208:
AFFECTS: users of net/py-bittorrent and net/py-bittorrent-core
AUTHOR: lioux@FreeBSD.org