On 2025/06/18 5:31 AM, Viktor Dukhovni via Exim-users wrote:
Jeremy, is there anything in Exim roughly equivalent to the Postfix
"fingerprint" security level?

With the caveat that I'm no expert on what Postfix is offering,
in Exim the server cert presented for a client connection is
available in $tls_out_peercert, and can be fed to assorted
hash operators (eg. ${sha256:...}) to obtain a fingerprint (*).

This could be compared against a reference value, for example
in the "client_condition" option of the authenticator being
used for the OP connection.

[
 There is the tls:cert event type, but related to this issue
 it could only be used to refuse an otherwise-passing verification,
 not the relaxation of security wanted.

 An extension I'd not considered; not too hard to code should anyone
 want to take the job on; slightly more technically satisfying than
 checking in the authenticator.
]

--
Cheers,
  Jeremy

*) under OpenSSL, is ends up calling X509_digest() with (eg.) EVP_sha256().
   under GnuTLS, which I think is the Debian preference,
   gnutls_x509_crt_get_fingerprint

--
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-users.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-users-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to