http://www.exim.org/exim-html-current/doc/html/spec_html/ch-encrypted_smtp_connections_using_tlsssl.html#SECTtlssni
If the string |tls_in_sni| appears in the main section’s
tls_certificate option (prior to expansion) then the following
options will be re-expanded during TLS session handshake, to permit
alternative values to be chosen:
o
tls_certificate
o
tls_crl
o
tls_privatekey
o
tls_verify_certificates
o
tls_ocsp_file
Unless it is indeed possible somehow, for the exim process to """regain
privs by exec'ing a new Exim""", I do indeed not have much hope to have
ever see my idea (aquire a file descriptor to the private key file early
on, as root) implemented, at least not as long as "|tls_in_sni| appears
in the main section’s tls_certificate option". Anyhow, it could be
arranged for the feature to only be effective for the opposite case
(i.e. |tls_in_sni| NOT appearing in the main section’s tls_certificate
option, couldn't it?
On 2017-08-18 20:43, Patrick Pfeifer wrote:
|Aha. As it happens, I found the answer to my last question already.
E.g. here: https://github.com/serghey-rodin/vesta/issues/1211
tls_privatekey = ${if
exists{/usr/local/vesta/data/ssl_pool/${tls_sni}.key}{/usr/local/vesta/data/ssl_pool/${tls_sni}.key}{/usr/local/vesta/ssl/certificate.crt}}
Now the hurdle appears already substantially higher. :-) ... |
vv s/,soes not have/,the exim4 binary does not have/ vv
On 2017-08-18 20:33, Patrick Pfeifer via Exim-users wrote:
On 2017-08-18 20:12, Jeremy Harris wrote:
First, you don't need to copy exim-dev as well as exim-users.
Devs will be reading both.
Ok. Sorry about the noise.
Exim does as little work as possible while in a privileged state, and
drops privs to do the rest. To regain privs it execs a new Exim.
Aha. Not in my setup though. (I see only one Exim process with UID
Debian-exim and I see no way that it could re-gain privs, although
root-owned, soes not have the suid bit set.)
The cert and privatekey files used can depend on information only
available immediately before they are needed (such as the remote IP).
As such they are only read at that time.
Aha. Well, that feature is putting some hurdle to the implementation
of my idea somehow. How is it activated?
Actually /all/ those certificates could / would then just need to be
read into memory (or a file descriptor to them acquired) early on,
i.e. as root. I imagine that it the number of keys is reasonably
small for a typical setup - but I have no clue about such setups
actually (?).
Or would that already be too much of a security threat in your eyes
as well? ... Actually I would argue against it, as with the current
setup Exim has access to all key files anyway. ...
--
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/