搜尋 Mozilla 技術支援網站

防止技術支援詐騙。我們絕對不會要求您撥打電話或發送簡訊,或是提供個人資訊。請用「回報濫用」功能回報可疑的行為。

了解更多

How can I override the restriction on the email address of a PKI signing certificate matching the mail account?

  • 2 回覆
  • 1 有這個問題
  • 1 次檢視
  • 最近回覆由 manchesterj

more options

I have used Thunderbird successfully to access multiple mails accounts; one individual mail account, the others are used by multiple people.

I use PKI certificates to send signed emails. My PKI certificates all have the email address of my individual mail account. In the past, I have been able to send signed emails with those certificates from other mail accounts. (The recipient will see the signature as questionable, but can examine the signing certificate to determine the authenticity of the sender.)

Thunderbird is not allowing me to select a certificate unless the email address in the certificate matches the email address of the mail account. Is there any way to override this?

I have used Thunderbird successfully to access multiple mails accounts; one individual mail account, the others are used by multiple people. I use PKI certificates to send signed emails. My PKI certificates all have the email address of my individual mail account. In the past, I have been able to send signed emails with those certificates from other mail accounts. (The recipient will see the signature as questionable, but can examine the signing certificate to determine the authenticity of the sender.) Thunderbird is not allowing me to select a certificate unless the email address in the certificate matches the email address of the mail account. Is there any way to override this?

所有回覆 (2)

more options

I would be rather disappointed if there was a way to over ride it. Sounds to me like someone has fixed a bug.

more options

I disagree. It would only be a bug if the person receiving the email did not clearly see an indication that the signature on the email is "invalid" (or at least 'suspect'). But recipients do see that indication.

Mozilla actually makes a habit of allowing for people to override security constraints. (Usually in that config file.)