https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=253060

--- Comment #3 from Michael Osipov <michael.osi...@siemens.com> ---
I have played around a bit what Leo has written.
The patch cannot be applied as such. If /etc/ssl/cert.pem does not exist
sendmail will say:
> Jul  8 14:32:44 deblndw013x3j sm-mta[90513]: STARTTLS=client: file 
> /etc/ssl/cert.pem unsafe: No such file or directory
> Jul  8 14:32:44 deblndw013x3j sm-mta[90513]: STARTTLS=client, error: load 
> verify locs /etc/ssl/certs, /etc/ssl/cert.pem failed: 0
> Jul  8 14:32:44 deblndw013x3j sm-mta[90513]: STARTTLS=client, 
> relay=mail2.siemens.de., version=TLSv1.2, verify=FAIL, 
> cipher=DHE-RSA-AES256-GCM-SHA384, bits=256/256
Even if /etc/ssl/certs will contain valid hashed links.

Now if you consider to prepend a dnl because you don't have such a file it will
fail also.
The only valid options I see are
* to leave confCACERT as-is and fix confCACERT_PATH only
* tell sendmail not to verify any paths and leave it to OpenSSL which will do
the right thing. With that you can drop confCACERT if it does not exist
* apply libfetch's approach and set default's if neither is set:
https://github.com/freebsd/freebsd-src/blob/373ffc62c158e52cde86a5b934ab4a51307f9f2e/lib/libfetch/common.c#L1105-L1109

So this does work for me now:
> define(`confCACERT', `CERT_DIR/cacert.pem')dnl
> define(`confCACERT_PATH', `/etc/ssl/certs')dnl
output:
> Jul  8 14:51:27 deblndw013x3j sm-mta[90897]: STARTTLS=client, 
> relay=mail3.siemens.de., version=TLSv1.2, verify=OK, 
> cipher=DHE-RSA-AES256-GCM-SHA384, bits=256/256

I prefer option 2 AND 3

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to