On 2009-08-31 Ivan Shmakov <[email protected]> wrote:
> Package: exim4-daemon-heavy
> Version: 4.69-9
> Severity: important

>       It seems that the certificate verification fails when Exim
>       connects to the peer, while should the peer in question connect
>       to Exim, it succeeds.  Consider, e. g.:

>       * accepting peer's connection (we're the server):

> 2009-08-31 20:03:54 1MiD6Y-0006C4-8S <= i...@main... H=... (...) 
> [62.109.12.37] P=esmtps X=TLS1.0:RSA_AES_256_CBC_SHA1:32 CV=yes 
> DN="C=RU,ST=Altai Krai,O=Private,OU=SMTP 
> peers,CN=waterlily.ip.uusia.org,[email protected]" S=800 
> id=e1mid6m-00052j...@...

>       * making a connection to the same peer (we're the client):

> 2009-08-31 20:05:43 1MiD8A-0008Jf-2X => i...@main... R=hubbed_hosts 
> T=remote_smtp H=waterlily.ip.uusia.org [62.109.12.37] 
> X=TLS1.0:RSA_AES_256_CBC_SHA1:32 CV=no DN="C=RU,ST=Altai 
> Krai,O=Private,OU=SMTP 
> peers,CN=waterlily.ip.uusia.org,[email protected]"

>       Note the CV=yes vs. CV=no discrepancy.
[...]

Hello,
Afaict you have provided exim with a list of trusted certificates to
check incoming connections (main configuration option
tls_verify_certificates) against but you have not toggled the
corresponding option for outgoing connections (the
tls_verify_certificates private option of the smtp transport).

cu andreas



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to