On Wed, Feb 22, 2006 at 11:52:11AM -0700, Ken Johanson wrote:

> Apple/Safari browsers (all current versions) have a bug where if they
> attempt to connect to a SSL client-authenticated website, and have
> client certs in their keystore whos signers/chain is not solicited
> during SSL handshake.. then Safari may send the unsolicited cert
> anyway.

Most SMTP clients send client certificates even when the signing CA is
not solicited. The Postfix SMTP server does not complain if the client
certificate verification fails. The key issue is coding the server-side
verification callback correctly, so that the session is not rejected
despite the unverifiable client certificate.


>From the bottom of tls_verify_certificate_callback():

    /*
     * Never fail in case of opportunistic mode.
     */
    if (TLScontext->enforce_verify_errors)
        return (ok);
    else
        return (1);

Normally "enforce_verify_errors" is not set.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to