Am 20.12.2011 14:30, schrieb lst_ho...@kwsoft.de:

Hi,

>>>> Any idea how to allow all certificates issued by specific Sub-CAs,
>>>> without trusting everyone?
>>>
>>> As far as i understand you have to list the complete chain but only your
>>> sub-CA to get it working. So create a smtpd_tls_CAfile with the Telekom
>>> root and your sub-CA and nothing else. This would allow relaying for any
>>> certificate your sub-CA or the Telekom root CA has issued, but not for
>>> certificates issued by any sub-CA of the Telekom beside yours. Be aware
>>> that you should not do this on a public facing port 25.
>>
>> Unfortunately no-go, the full chain needs to be in smtpd_tls_CApath,
>> otherwise I get the "unable to get issuer certificate". And doing that
>> would blow the purpose, since we would be an open relay for everyone
>> having a DTAG certificate.
> 
> To my knowledge you would *only* be an open relay for certificates
> issued directly by the Telekom root-CA and for certificates issued by
> your sub-CA, not for certificates issued by other Telekom sub-CAs not
> included in the file. Not sure if the Telekom root-CA is used to issue
> certificates anyway.
> Viktor will correct me if i'm wrong ;-)

I thought so, too. But apparently it is enough that the client supplies
the rest of the certificate chain. I tested that by only allowing the
Telekom Root-CA and having the client (openssl s_client) send the whole
chain including the intermediate CAs ... bam, Trusted.

Bernhard

Reply via email to