Validating certificate chain of SMTP TLS connections using privately-issued CA certs

2022-03-14 Thread readme
A private CA has issued server certs to mail.example.org. However, when smtpd from another server in the example.org domain connects to mail.example.org, TLS validation fails and the message exchange falls back to smtp+notls Is there way to add a cert chain somewhere that smtpd will do a chain

Re: Validating certificate chain of SMTP TLS connections using privately-issued CA certs

2022-03-14 Thread readme
On Tue, Mar 15, 2022 at 09:40:34AM +1100, Dipesh Sharma wrote: >Did you try the 'tls no-verify' option described here: >https://man.openbsd.org/smtpd.conf#tls ? If you are sure that some host >under example.com is talking to the correct mail.example.com host, it is OK >to skip the certificate

Re: Validating certificate chain of SMTP TLS connections using privately-issued CA certs

2022-03-14 Thread Dipesh Sharma
Did you try the 'tls no-verify' option described here: https://man.openbsd.org/smtpd.conf#tls ? If you are sure that some host under example.com is talking to the correct mail.example.com host, it is OK to skip the certificate verification. Thanks, Dipesh On Tue, Mar 15, 2022 at 7:18 AM