On Wednesday 19 November 2008 13:23:39 Noel Jones wrote:
> Mark Watts wrote:
> > I'm in the process of setting up TLS on a number of servers.
> > I have two servers, both running Postfix, one an smtp client and the
> > other an smtpd server, using a self-signed SSL certificate.
> >
> > Sending messages, I get the following in the log on the sender:
> >
> > Nov 19 10:05:01 mailr postfix/smtp[22688]: setting up TLS connection to
> > mail.linux-corner.info Nov 19 16:05:01 mailr postfix/smtp[22688]: TLS
> > connection established to mail.linux-corner.info: TLSv1 with cipher
> > ADH-AES256-SHA (256/256 bits)
>
> When receiving mail, a client certificate is not requested.
> As a result, the connection is considered "Anonymous".
> You can control this with smtpd_tls_ask_ccert, but some mail
> clients have trouble when this is set to "yes", so the
> sensible default is "no".
> http://www.postfix.org/postconf.5.html#smtpd_tls_ask_ccert
>
> > However, the same server sending to another TLS-enabled server (I believe
> > its qmail), I get this:
> >
> > Nov 19 10:09:09 mailr postfix/smtp[25134]: setting up TLS connection to
> > burn.qinetiq.com Nov 19 10:09:09 mailr postfix/smtp[25134]: certificate
> > verification failed for burn.qinetiq.com: num=18:self signed certificate
> > Nov 19 10:09:09 mailr postfix/smtp[25134]: Unverified:
> > subject_CN=burn.qinetiq.com, issuer=burn.qinetiq.com Nov 19 10:09:09
> > mailr postfix/smtp[25113]: TLS connection established to
> > burn.qinetiq.com: TLSv1 with cipher AES256-SHA (256/256 bits)
>
> When sending mail, the server certificate is always received
> and verified.  There are various smtp_tls_* options that allow
> you to control what happens next; the sensible default
> behavior is to ignore verification errors and continue.
> http://www.postfix.org/TLS_README.html
>
> > Why do I not get any verification messages from the remote postfix
> > server, yet I do with the remote (qmail) one, when both are usiong
> > self-signed certificates?
> >
> > Mark.
>
> Virtually all MTA to MTA smtp tls is opportunistic encryption
> - it's nice but not required.  In this context, it doesn't
> matter if the certificate is verified since you are willing to
> accept unencrypted connections from the same client.
>
> If you're establishing a secure channel between sites with
> encryption and verification required, there are options
> discussed in the TLS_README to allow this.

OK, I understand this, but in my example both connections were from the same 
server to remote servers with self-signed certificates.
I would have expected to see the same verification (failures in this case) log 
entries for both connections, but I don't.

Mark.

-- 
Mark Watts BSc RHCE MBCS
Senior Systems Engineer
QinetiQ Applied Technologies
GPG Key: http://www.linux-corner.info/mwatts.gpg

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to