Bug#522690: exim4-daemon-heavy: previously working client ssl certificate setup fails to work in lenny
Stephen Gran
sgran at debian.org
Sun Apr 5 21:35:22 UTC 2009
Package: exim4-daemon-heavy
Version: 4.69-9
Severity: important
Hi there,
I use ssl certificates to control mail relaying. This means that the
client must present it's ssl certificates to the the central server.
In general, though, since I, in my role as DSA, want to use roughly
the same config file with a few ifdef's to control behavior on lots
of machines, this means that all machines should, generally speaking,
present their client certs on all TLS transactions when asked to do so.
In etch, I used a remote_smtp transport like so:
remote_smtp_smarthost:
debug_print = "T: remote_smtp_smarthost for $local_part@$domain"
driver = smtp
port = 587
tls_certificate = CONFDIR/lobefin.net.crt
tls_privatekey = CONFDIR/lobefin.net.key
In lenny, the following transport:
remote_smtp:
driver = smtp
connect_timeout = 1m
tls_certificate = /etc/exim4/ssl/thishost.crt
tls_privatekey = /etc/exim4/ssl/thishost.key
Completely fails to send a client certificate. If I add validation
options (tls_verify_hosts, tls_try_verify_hosts) the client will send
it's certificate, but only when it validates against the mail server ca,
and will send cleartext otherwise. This seems rather pointless, when
what I want to do is use TLS as transport protection in the general
case, but allow machines that have valid certificates to relay.
This is a pretty clear regression, hence the severity. If there is
something I've missed, please let me know - I don't see it right now.
Cheers,
-- Package-specific info:
Exim version 4.69 #1 built 30-Sep-2008 18:26:44
Copyright (c) University of Cambridge 2006
Berkeley DB: Berkeley DB 4.6.21: (September 27, 2007)
Support for: crypteq iconv() IPv6 PAM Perl Expand_dlfunc GnuTLS move_frozen_messages Content_Scanning Old_Demime
Lookups: lsearch wildlsearch nwildlsearch iplsearch cdb dbm dbmnz dnsdb dsearch ldap ldapdn ldapm mysql nis nis0 passwd pgsql sqlite
Authenticators: cram_md5 cyrus_sasl dovecot plaintext spa
Routers: accept dnslookup ipliteral iplookup manualroute queryprogram redirect
Transports: appendfile/maildir/mailstore/mbx autoreply lmtp pipe smtp
Fixed never_users: 0
Size of off_t: 8
Configuration file is /etc/exim4/exim4.conf
-- System Information:
Debian Release: 5.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Kernel: Linux 2.6.26-1-686 (SMP w/8 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.utf8)
Shell: /bin/sh linked to /bin/bash
Versions of packages exim4-daemon-heavy depends on:
ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy
ii exim4-base 4.69-9 support files for all Exim MTA (v4
ii libc6 2.7-18 GNU C Library: Shared libraries
ii libdb4.6 4.6.21-11 Berkeley v4.6 Database Libraries [
ii libgnutls26 2.4.2-6+lenny1 the GNU TLS library - runtime libr
ii libldap-2.4-2 2.4.11-1 OpenLDAP libraries
ii libmysqlclient15off 5.0.51a-24 MySQL database client library
ii libpam0g 1.0.1-5 Pluggable Authentication Modules l
ii libpcre3 7.6-2.1 Perl 5 Compatible Regular Expressi
ii libperl5.10 5.10.0-19 Shared Perl library
ii libpq5 8.3.6-1 PostgreSQL C client library
ii libsasl2-2 2.1.22.dfsg1-23 Cyrus SASL - authentication abstra
ii libsqlite3-0 3.5.9-6 SQLite 3 shared library
exim4-daemon-heavy recommends no packages.
exim4-daemon-heavy suggests no packages.
-- debconf information:
exim4-daemon-heavy/drec:
More information about the Pkg-exim4-maintainers
mailing list