On Wed, Nov 19, 2008 at 12:50:40PM -0600, Larry Stone wrote:

> On Wed, 19 Nov 2008, Mark Watts wrote:
> 
> >The server I'm in control of is signed by a CA. (This server does not give 
> >any
> >verification failure messages)
> >I don't know about the other server.
> 
> I'm getting confused as to which server is which but I'm sensing that you 
> think self-signed means automatically untrusted. While I don't claim to be 
> any sort of certificate expert, [...]

The OP's question has been resolved. When connecting to Postfix server,
the client negotiates a certificate-less cipher-suite (ADH-AES256-SHA):

    ADH-AES256-SHA          SSLv3 Kx=DH       Au=None Enc=AES(256)  Mac=SHA1

as there is no server certificate, there are no warnings about an untrusted
server certificate. When connecting to the Qmail server, which does not
support ADH (aka aNULL) ciphers, the client negotiates AES256-SHA:

    AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1

(which doe not even do ephemeral DH key exchange, so perhaps Qmail
is not configured with DH parameters, or has a non-default SSL
cipherlist). With this cipher-suite there is a certificate, and Postfix
logs the verification failure.

-- 
        Viktor.

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the "Reply-To" header.

To unsubscribe from the postfix-users list, visit
http://www.postfix.org/lists.html or click the link below:
<mailto:[EMAIL PROTECTED]>

If my response solves your problem, the best way to thank me is to not
send an "it worked, thanks" follow-up. If you must respond, please put
"It worked, thanks" in the "Subject" so I can delete these quickly.

Reply via email to