Install a Sectigo Domain Validation SSL certificate in Zimbra Rumi, December 16, 2021 We usually get the below four files from Sectigo in the certificate bundle. The file name may vary depending on the certificate type yourdomain.com.crt – main certificate AAACertificateServices.crt – Root Certificate USERTrustRSAAAACA.crt – Intermediate Certificate – 1 SectigoRSADomainValidationSecureServerCA.crt – Intermediate Certificate – 2 Step 1: We shall create two files as below. commercial_ca.crt (includes root certificate and two intermediate certificates) commercial.crt (includes main certificate, root certificate and two intermediate certificates) Step 2: Login to Zimbra server, move to directory /opt/zimbra/ssl/zimbra/commercial and create two files as below. root@mail:~# cd /opt/zimbra/ssl/zimbra/commercial/ root@mail:/opt/zimbra/ssl/zimbra/commercial# touch commercial_ca.crt root@mail:/opt/zimbra/ssl/zimbra/commercial# touch commercial.crt Step 3: Provide ownership to Zimbra. root@mail:/opt/zimbra/ssl/zimbra/commercial# chown zimbra:zimbra commercial_ca.crt root@mail:/opt/zimbra/ssl/zimbra/commercial# chown zimbra:zimbra commercial.crt Step 4: Add the certificates into respective files as mentioned above. root@mail:/opt/zimbra/ssl/zimbra/commercial# vim commercial_ca.crt -----BEGIN CERTIFICATE----- <root certificate is here> -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- <intermediate certificate 1 is here> -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- <intermediate certificate 2 is here> -----END CERTIFICATE----- root@mail:/opt/zimbra/ssl/zimbra/commercial# vim commercial.crt -----BEGIN CERTIFICATE----- <main certificate is here> -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- <root certificate is here> -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- <intermediate certificate 1 is here> -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- <intermediate certificate 2 is here> -----END CERTIFICATE----- Step 5: Execute below command as Zimbra user to verify the certificate. zimbra@mail:~/ssl/zimbra/commercial$ /opt/zimbra/bin/zmcertmgr verifycrt comm /opt/zimbra/ssl/zimbra/commercial/commercial.key /opt/zimbra/ssl/zimbra/commercial/commercial.crt /opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt The output of this command shall look like below. ** Verifying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' against '/opt/zimbra/ssl/zimbra/commercial/commercial.key' Certificate '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' and private key '/opt/zimbra/ssl/zimbra/commercial/commercial.key' match. ** Verifying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' against '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' Valid certificate chain: /opt/zimbra/ssl/zimbra/commercial/commercial.crt: OK We shall not proceed further if we get any error here. We have to resolve the error first and then install the certificate following step 6. Step 6: Install the certificate. zimbra@mail:~/ssl/zimbra/commercial$ /opt/zimbra/bin/zmcertmgr deploycrt comm /opt/zimbra/ssl/zimbra/commercial/commercial.crt /opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt The output should look like below. ** Keeping first certificate in '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' ** Verifying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' against '/opt/zimbra/ssl/zimbra/commercial/commercial.key' Certificate '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' and private key '/opt/zimbra/ssl/zimbra/commercial/commercial.key' match. ** Verifying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' against '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' Valid certificate chain: /opt/zimbra/ssl/zimbra/commercial/commercial.crt: OK ** Appending ca chain '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' ** Importing cert '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' as 'zcs-user-commercial_ca' into cacerts '/opt/zimbra/common/lib/jvm/java/jre/lib/security/cacerts' ** NOTE: restart mailboxd to use the imported certificate. ** Saving config key 'zimbraSSLCertificate' via zmprov modifyServer mail.outpacebd.com...ok ** Saving config key 'zimbraSSLPrivateKey' via zmprov modifyServer mail.outpacebd.com...ok ** Installing imapd certificate '/opt/zimbra/conf/imapd.crt' and key '/opt/zimbra/conf/imapd.key' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/imapd.crt' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/imapd.key' ** Creating file '/opt/zimbra/ssl/zimbra/jetty.pkcs12' ** Creating keystore '/opt/zimbra/conf/imapd.keystore' ** Installing ldap certificate '/opt/zimbra/conf/slapd.crt' and key '/opt/zimbra/conf/slapd.key' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/slapd.crt' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/slapd.key' ** Creating file '/opt/zimbra/ssl/zimbra/jetty.pkcs12' ** Creating keystore '/opt/zimbra/mailboxd/etc/keystore' ** Installing mta certificate '/opt/zimbra/conf/smtpd.crt' and key '/opt/zimbra/conf/smtpd.key' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/smtpd.crt' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/smtpd.key' ** Installing proxy certificate '/opt/zimbra/conf/nginx.crt' and key '/opt/zimbra/conf/nginx.key' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/nginx.crt' ** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/nginx.key' ** NOTE: restart services to use the new certificates. ** Copying CA to /opt/zimbra/conf/ca ** Copying '/opt/zimbra/ssl/zimbra/ca/ca.key' to '/opt/zimbra/conf/ca/ca.key' ** Copying '/opt/zimbra/ssl/zimbra/ca/ca.pem' to '/opt/zimbra/conf/ca/ca.pem' ** Creating CA hash symlink 'a23bec5a.0' -> 'ca.pem' ** Creating /opt/zimbra/conf/ca/commercial_ca_1.crt ** Creating CA hash symlink 'ee64a828.0' -> 'commercial_ca_1.crt' ** Creating /opt/zimbra/conf/ca/commercial_ca_2.crt ** Creating CA hash symlink '65ff7287.0' -> 'commercial_ca_2.crt' ** Creating /opt/zimbra/conf/ca/commercial_ca_3.crt ** Creating CA hash symlink 'fc5a8f99.0' -> 'commercial_ca_3.crt' Step 7: Restart Zimbra service to take effect the changes. zimbra@mail:~$ zmcontrol restart Hope this helps . Src: https://learnandgains.blogspot.com/2020/06/install-comodosectigo-domain-validation.html Related Administrations Application Configurations (Linux) ComodoSectigoSSLzimbraZimbra SSL
PowerDNS Cache dump in CSV September 17, 2011 The objective is simple, a periodic cron cache dump of powerdns recursor on a setup. 1. create a shell code as below using nano- #nano /usr/local/bin/pdns-cache-dump.sh #!/bin/sh DAY=`/bin/date +%Y%m%d` TFILE="/var/log/pdns-cache/$(basename $0).$DAY.csv" rec_control dump-cache $TFILE echo "cache dump completed, dump script by rumi (hasan.emdad@mango.com.bd)" Related Read More
Creating Software RAID-1 in Debian/Ubuntu May 26, 2013May 26, 2013 Below are the steps on how to configure the Software RAID: 1) Select the Manual for the Partitioning Method: 2) On this screen, it will show you the available hard disk for the installation. Make sure both hard disks are visible. Now select the first hard disk… Read More
Postfix 2.2.3 main.cf configured sample file October 28, 2008 queue_directory = /var/spool/postfix command_directory = /usr/sbin daemon_directory = /usr/libexec/postfix mail_owner = postfix myhostname = server.domain.com mydomain = domain.com myorigin = $mydomain inet_interfaces = all mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain, mail. $mydomain, www.$mydomain, ftp.$mydomain local_recipient_maps = unknown_local_recipient_reject_code = 550 mynetworks = 192.168.1.0/24 127.0.0.0/8 #relay_domains = $mydestination #relayhost = $mydomain #relayhost… Read More
Hello I have a problem to deploy my certifcate Sectigo send me 3 file crt file certficat.key ca.bundle Reply
[root@mail commercial]# /opt/zimbra/bin/zmcertmgr verifycrt comm commercial.key commercial.crt commercial_ca.crt ** Verifying commercial.crt against commercial.key Certificate (commercial.crt) and private key (commercial.key) match. XXXXX ERROR: Invalid Certificate: commercial.crt: C = xx , ST = xxx xxx, O = xxxxx, CN = *.xxxxx error 20 at 0 depth lookup:unable to get local issuer certificate Reply