Hi Michael
This is what we use:
tls_certificate = /etc/exim4/ssl/${interface_address}.crt
tls_privatekey = /etc/exim4/ssl/${interface_address}.key
Then simply name your cert and key files according to your interface ip
addresses.
You should be able to use a lookup in a file with
Hi
We have set up exim to allow encrypted connections.
This works fine if the client uses EHLO.
But if the client uses HELO and then sends STARTTLS,
exim responds with STARTTLS command used when not advertised.
Is there a way to allow STARTTLS even if the peer host
used HELO instead of EHLO?
Since it's against the RFC, we not going to be making that kind of
change to the Exim code. We're following the guidelines and so are 99.9%
of the other SMTP speakers out there. STARTTLS is an Extended SMTP verb
and as such is restricted to programs talking ESMTP. Computers aren't as
smart as us
Hi
I'm looking for a way to verify the fingerprint
of a remote server's certificate when sending
mail.
I understand tls_verify_certificates can be used
to match the certificate. Is there a way to verify
the fingerprint instead?
What I'm looking for is what can be done in postfix
with a
Hi Mike
Thank you for your answer.
That was my impression as well. If there is no other
way I will use this method.
Thanks!
David
On 11/01/2011 10:44, David Angleitner wrote:
I'm looking for a way to verify the fingerprint
of a remote server's certificate when sending
mail.
I