Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2021-03-15 Thread Viktor Dukhovni via Exim-dev
> On Mar 15, 2021, at 6:24 AM, Heiko Schlittermann via Exim-dev > wrote: > > If the next hop's hostname comes from insecure DNS, you're right. If the > next hop's hostname is hard-wired into the configuration (as typically > found in "use-a-smarthost" setups), I believe, it's useful to check

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2021-03-15 Thread Heiko Schlittermann via Exim-dev
Viktor Dukhovni via Exim-dev (So 14 Mär 2021 14:33:21 CET): > For the record, the expectation is: > > - Absent DANE TLSA records, the literal MX hostname, which is >of course insecurely obtained from MX records, so validation >is mostly an exercise in futility. It would only mean

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2021-03-14 Thread Viktor Dukhovni via Exim-dev
For the record, the expectation is: - Absent DANE TLSA records, the literal MX hostname, which is of course insecurely obtained from MX records, so validation is mostly an exercise in futility. It would only mean something if MTA-STS were implemented, but Exim does not MTA-STS last I

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2021-03-13 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Heiko Schlittermann changed: What|Removed |Added CC||h...@schlittermann.de --- Comment #11

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-07-21 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Jeremy Harris changed: What|Removed |Added CC||j...@ziepe.ca --- Comment #10 from Jeremy

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-07-17 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Jeremy Harris changed: What|Removed |Added See Also||https://bugs.exim.org/show_ |

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-21 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Jeremy Harris changed: What|Removed |Added Resolution|--- |FIXED Status|ASSIGNED

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-11 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Git Commit changed: What|Removed |Added CC||g...@exim.org --- Comment #8 from Git Commit ---

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-10 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Jeremy Harris changed: What|Removed |Added Status|NEW |ASSIGNED --- Comment #7 from Jeremy Harris ---

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-09 Thread Jeremy Harris via Exim-dev
On 09/06/2020 18:33, Viktor Dukhovni via Exim-dev wrote: > Perhaps so, but in the context of everything else in RFC6125, and the > specs for other protocols, ... it is fairly clear (to me anyway) that > the intent is to match the SMTP server name prior to CNAME expansion, > just like the

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-09 Thread Viktor Dukhovni via Exim-dev
On Tue, Jun 09, 2020 at 04:41:33PM +0100, Jeremy Harris via Exim-dev wrote: > On 08/06/2020 14:51, Viktor Dukhovni via Exim-dev wrote: > > Yes: https://tools.ietf.org/html/rfc6125#appendix-B.4 > > > > The original reported is right. > > No, it's worse. If you take that RFC 3207 wording

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-09 Thread Jeremy Harris via Exim-dev
On 08/06/2020 14:51, Viktor Dukhovni via Exim-dev wrote: > On Mon, Jun 08, 2020 at 12:48:22PM +, admin--- via Exim-dev wrote: > >> https://bugs.exim.org/show_bug.cgi?id=2594 >> >> --- Comment #1 from Jeremy Harris --- >> Can you locate a standards document specifying the name that should be

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-09 Thread Jeremy Harris via Exim-dev
On 08/06/2020 14:51, Viktor Dukhovni via Exim-dev wrote: > On Mon, Jun 08, 2020 at 12:48:22PM +, admin--- via Exim-dev wrote: > >> https://bugs.exim.org/show_bug.cgi?id=2594 >> >> --- Comment #1 from Jeremy Harris --- >> Can you locate a standards document specifying the name that should be

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-09 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 --- Comment #6 from Chris Paulson-Ellis --- (In reply to Phil Pennock from comment #5) > In the original bug-report here: > > """ > Cert hostname to check: "mail.edesix.local" > Setting TLS SNI "mail.dev.edesix.com" > """ > > That is clearly an

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Phil Pennock changed: What|Removed |Added CC||p...@exim.org --- Comment #5 from Phil Pennock

Re: [exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread Viktor Dukhovni via Exim-dev
On Mon, Jun 08, 2020 at 12:48:22PM +, admin--- via Exim-dev wrote: > https://bugs.exim.org/show_bug.cgi?id=2594 > > --- Comment #1 from Jeremy Harris --- > Can you locate a standards document specifying the name that should be checked > against the certificate? Yes:

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 --- Comment #4 from Chris Paulson-Ellis --- The STARTTLS RFC 3207 is not very helpful, describing it as a local matter and using words like probably: 4.1 Processing After the STARTTLS Command ... The decision of whether or not to believe the

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 --- Comment #3 from Jeremy Harris --- All very well... but an MTA is not a browser. -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at https://lists.exim.org/mailman/listinfo/exim-dev Exim details at

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 --- Comment #2 from Chris Paulson-Ellis --- I thought you might ask that :-) I don't think this specific issue is explicitly addressed in either the SMTP, TLS or HTTPS RFCs. HTTPS is quite clear that the name being tested comes from the URI, but

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 --- Comment #1 from Jeremy Harris --- Can you locate a standards document specifying the name that should be checked against the certificate? -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at

[exim-dev] [Bug 2594] CNAME handling can break TLS certificate verification

2020-06-08 Thread admin--- via Exim-dev
https://bugs.exim.org/show_bug.cgi?id=2594 Chris Paulson-Ellis changed: What|Removed |Added Summary|CNAME handing can break TLS |CNAME handling can break