diff options
author | Simon Barner <barner@FreeBSD.org> | 2005-12-10 22:51:45 +0000 |
---|---|---|
committer | Simon Barner <barner@FreeBSD.org> | 2005-12-10 22:51:45 +0000 |
commit | 30ac01d9f286d3f648eb1028064bcf4408371766 (patch) | |
tree | b73e6c92d62acea59bdbe45985c718da6bf6ae81 /UPDATING | |
parent | 351df0179529f0aa42a0fad5ac405eb5e9fc5859 (diff) | |
download | ports-30ac01d9f286d3f648eb1028064bcf4408371766.tar.gz ports-30ac01d9f286d3f648eb1028064bcf4408371766.zip |
Notes
Diffstat (limited to 'UPDATING')
-rw-r--r-- | UPDATING | 29 |
1 files changed, 29 insertions, 0 deletions
@@ -6,6 +6,35 @@ You should get into the habit of checking this file for changes each time you update your ports collection, before attempting any port upgrades. +20051210: + AFFECTS: users of mail/fetchmail using SSL encryption + AUTHOR: barner@FreeBSD.org + + Fetchmail now checks the validity of server certificates and complains + verbosely in maillog if the validation fails. + + If your mail server's certificate is not signed by one of the root + authorities, you have to manually configure them using the following steps: + + * Download the necessary certificates in PEM format and store them + at a suitable location, e.g. /home/user/.certs + + * Run the c_rehash tool on the freshly installed certificates: + + - If you are using OpenSSL from the base system (this is the default) + use the following command: + % perl /usr/src/crypto/openssl/tools/c_rehash /home/user/.certs + + - If you are using OpenSSL from security/openssl please use + % c_rehash /home/user/.certs + + * Use the following options to enable SSL encryption your .fetchmailrc + configuration file: + + options ssl sslcertpath /home/user/.certs sslcertck + sslfingerprint '< fingerprint >' + < other options > + 20051208: AFFECTS: users of net/py-bittorrent and net/py-bittorrent-core AUTHOR: lioux@FreeBSD.org |