|
@@ -371,18 +371,26 @@ Use old versions only when the server has problems with newer ones.
|
|
|
..
|
|
|
.TP
|
|
|
\fBSystemCertificates\fR \fByes\fR|\fBno\fR
|
|
|
-Whether the system's default root cerificate store should be loaded.
|
|
|
+Whether the system's default CA (certificate authority) certificate
|
|
|
+store should be used to verify certificate trust chains. Disable this
|
|
|
+if you want to trust only hand-picked certificates.
|
|
|
(Default: \fByes\fR)
|
|
|
..
|
|
|
.TP
|
|
|
\fBCertificateFile\fR \fIpath\fR
|
|
|
File containing additional X.509 certificates used to verify server
|
|
|
-identities. Directly matched peer certificates are always trusted,
|
|
|
-regardless of validity.
|
|
|
-.br
|
|
|
-Note that the system's default certificate store is always used
|
|
|
-(unless \fBSystemCertificates\fR is disabled)
|
|
|
-and should not be specified here.
|
|
|
+identities.
|
|
|
+These certificates are always trusted, regardless of validity.
|
|
|
+.br
|
|
|
+The certificates from this file are matched only against the received
|
|
|
+server certificate itself; CA certificates are \fBnot\fR supported here.
|
|
|
+Do \fBnot\fR specify the system's CA certificate store here; see
|
|
|
+\fBSystemCertificates\fR instead.
|
|
|
+.br
|
|
|
+The contents for this file may be obtained using the
|
|
|
+\fBmbsync-get-cert\fR tool; make sure to verify the fingerprints of the
|
|
|
+certificates before trusting them, or transfer them securely from the
|
|
|
+server's network (if it is trusted).
|
|
|
..
|
|
|
.TP
|
|
|
\fBClientCertificate\fR \fIpath\fR
|