Hello

Sendmail has a number of TLS certificate validation options described
here: http://www.sendmail.co.uk/sm/open_source/docs/m4/starttls.html#allow_con

VERIFY verification must have succeeded
VERIFY:bits verification must have succeeded and ${cipher_bits} must
be greater than or equal bits.
ENCR:bits ${cipher_bits} must be greater than or equal bits.

CN:name name must match ${cn_subject}
CN ${server_name} must match ${cn_subject}
CS:name name must match ${cert_subject}
CI:name name must match ${cert_issuer}

These can be enabled when Sendmail is acting as a client or as a
server. Furthermore, using the routing table it is possible to define
different settings for different remote hosts (clients or servers).

Looking at the Postfix configuration pages I can see how the
smtp_tls_policy_maps option can be used to enable verification of
remote server certificates When Postfix is the client but there
doesn't seem to be the same level of control over what verification
takes place exactly.

As for verification of client certificates, I can see the relevant
section in TLS_README but it looks like a global option, i.e. it must
be enabled for all clients or not at all.

My questions:
1.  Am I correct that the same level of verification control is not
possible in Postfix (perhaps for good reason) or am I overlooking
something?  If I'm right what steps does Postfix take exactly to
verify certificates?
2.  Is it possible to enable client certification verification for
some clients and not others?

regards,
Rob Maidment

Reply via email to