On Sun, Sep 15, 2013 at 03:31:38PM -0400, James Cloos wrote:

> The mx lookup on effraie.org returns mx.effraie.org.  The cert
> mx.effraie.org sends has a number of dnsnames, but not mx.effraie.org.
> 
> I bet that is why the session failed.

I noticed this, but I thought it unlikely that a sender willing to
accept self-signed certificates, would object to the peername in
such a certificate.  SMTP clients SHOULD NOT attempt to perform
*any* verification of SMTP server certificates without out-of-band
information about how to do that (local secure-channel configuration,
or DANE TLSA).

Yes, the possibility does exist that you're right anyway, and the
conservative (Postel) configuration is to have a matching CN or
subjectAltName even in a self-signed certificate.

> In general, the name returned by the MX lookup is used as the TLS server
> name when tls verification is attempted.

In general, with SMTP, when TLS is used it all it is TLS opportunistic
and unauthenicated.  I still think that either that Yahoo host was
configured to perform some sort of probe function, or it was not performing
as intended.

-- 
        Viktor.

Reply via email to