On Wed, 2025-06-18 at 23:27 +1000, Viktor Dukhovni via Exim-users
wrote:
> > 

> > 
> Understood, thanks.  FWIW the "fingerprint" security level in Postfix
> allows the SMTP client to authenticate the remote server by matching
> the
> presented certificate or public key digest against any of a set of
> expected fingerprints.  The policy applicable to a given nexthop
> destination is typically a result of a table lookup.
> 
>     <nexthop> fingerprint match=digest [match=digest ...]
> 
> > This could be compared against a reference value, for example
> > in the "client_condition" option of the authenticator being
> > used for the OP connection.
> 
> Sounds like with a bit of attention to detail it should be possible
> to
> put together equivalent logic in Exim.  Use the nexthop as a lookup
> key to find the expected digest(s) and then compare...

He can probably just set up stunnel, and tell Exim to connect to that
instead. I think you can just hand a server cert to stunnel and tell it
to require that one.

-- 
Mike Cardwell <mike.cardw...@grepular.com> ----- @grepular:matrix.org
https://www.linkedin.com/in/mikecardwell --- https://www.grepular.com
https://bsky.app/profile/grepular.com ----- @grepular@mastodon.social
https://www.emailprivacytester.com ------ https://gitlab.com/grepular
https://www.parsemail.org --------- https://hub.docker.com/u/grepular

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-users.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-users-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to