On Wed, Mar 02, 2011 at 09:15:24AM +0100, kapetr wrote:

> Hello,
> 
> I HAVE TO apologize me :-)
> 
> I had present my solution  with stunnel4- and now I see (as wrote by
> <r...@gmx.co.uk> - thanks) it is in
> http://www.postfix.org/TLS_README.html#client_smtps.

Note, however, that stunnel will not by default verify peer certificates, so
additional configuration is required for that. Only stunnel's verification
level 3, where the remote peer certificate is locally installed in a
local CAfile referenced in the stunnel.conf file actually verifies that
you are reaching the right peer server.

Stunnel has no support for peername verification via trusted
CAs. Stunnel's verification level 2 just lulls unsuspecting users into
a false sense of security. It just verifies the certificate trust chain
(essentially pointless), but not the peername. I tried to convince the
author of stunnel that verification level 2 is broken, and should be
modified, ... he was not interested.

-- 
        Viktor.

Reply via email to