On Tue, Jul 29, 2014 at 09:13:19AM -0400, Wietse Venema wrote:

> > IIRC smtpd_tls_ask_ccert should not be enabled on publicly referenced MTAs,
> > because there are enough MTAs out there unable to handle client certificate
> > requests from a server they connect to.
> 
> Is this still true? Assuming that you are referring to MTA-MTA
> communication, not end-user MUAs (such as old Netscape clients that
> should have fallen to dust by now).

There were IIRC (also?) some issues with qmail, which is not updated
terribly frequently.  TLS_README says:

    Note, that unless client certificates are used to allow greater access to
    TLS authenticated clients, it is best to not ask for client certificates at
    all, as in addition to increased overhead some clients (notably in some
    cases qmail) are unable to complete the TLS handshake when client
    certificates are requested. 

This was long ago, someone might need to configure a few versions
of qmail with TLS and test...  No idea which versions of qmail are
still in use.

> > It that is true, would it be possible to make smtpd_tls_ask_ccert client
> > dependent e.g. request a ccert when the client sends e.g. a specific HELO
> > hostname?
> > 
> > mail.example.com        ask_ccert
> > .example.net            ask_ccert
> 
> Alternatively, allow a richer input to smtpd_tls_ask_ccert besides
> yes and no.  For example, a (match)list.

That was also my thinking, but I was expecting a new parameter, 

    smtpd_tls_ask_ccert_helo_names = <domain match list>

Turning "smtpd_tls_ask_ccert" from a boolean to a matchlist, requires
a bit of special gymnastics to deal with "yes" and "no", would that
be better?

-- 
        Viktor.

Reply via email to