> On Sep 11, 2017, at 5:21 AM, Dominic Raferd <domi...@timedicer.co.uk> wrote:
> 
> Does anyone know a way to detect if the certificate currently being used by 
> Postfix and/or Dovecot is nearing expiry (esp. in case they haven't picked up 
> the updated letsencrypt certificate)?

See below for OpenSSL 1.0.2 or later.  Earlier versions don't
have the "-verify_hostname" option, you can delete it if you
like, and omit that part of the certificate check, in which
case the code will also work for OpenSSL 1.0.1 and earlier
(which are EOL).

-- 
        Viktor.

#! /bin/bash

if [ $# -lt 3 -o $# -gt 4 ]; then
  printf "Usage: %s <CAfile> <days> <host> [port]\n" "$0" >&2
  exit 1
fi

# default
port=587

trusted=$1; shift
days=$1; shift
host=$1; shift
if [ $# -gt 0 ]; then port=$1; shift; fi

detail=$(
  (
    raw=$(
      (sleep 2; printf "QUIT\r\n") |
      openssl s_client -connect "$host:$port" -starttls smtp \
        -CAfile "$trusted" \
        -servername "$host" \
        -verify 9 \
        -verify_return_error \
        -verify_hostname "$host" \
        -showcerts 2>&3
    )

    if [ $? -ne 0 ]; then
       printf -- "%s\n" "$raw" >&3
       printf -- "SSL handshake failed\n" >&3
       exit 1
    fi

    chain=$(
      printf -- "%s\n" "$raw" | tee /dev/fd/3 |
      openssl crl2pkcs7 -nocrl -certfile /dev/stdin |
      openssl pkcs7 -print_certs
    )

    if [ -z "$chain" ]; then
      printf "Error getting server chain\n" >&2; exit 1
    else
      # Sadly, verify(1) prior to OpenSSL 1.1.0 did not return
      # meaningful exit codes.   So we look instead for output
      # lines that start with "error".
      #
      openssl verify \
        -trusted "$CAfile" \
        -attime $(( $(date +%s) + 86400 * $days )) \
        -untrusted <(printf -- "%s\n" "$chain") \
        <(printf -- "%s\n" "$chain") 2>&1 | tee /dev/fd/3 |
      if grep -i '^error' >/dev/null; then
        printf -- "Verification failed\n" >&2; exit 1
      fi
    fi
  ) 3>&1
)
if [ $? -ne 0 ]; then printf -- "%s\n" "$detail"; exit 1; fi

Reply via email to