Commit | Line | Data |
---|---|---|
7f3555b3 | 1 | # Exim test configuration 2133 |
a320fabd | 2 | # TLS client: verify certificate from server - name-fails |
e51c7be2 JH |
3 | |
4 | SERVER= | |
5 | ||
d4dc049f JH |
6 | .include DIR/aux-var/tls_conf_prefix |
7 | ||
e51c7be2 | 8 | primary_hostname = myhost.test.ex |
e51c7be2 JH |
9 | |
10 | FX = DIR/aux-fixed | |
11 | S1 = FX/exim-ca/example.com/server1.example.com | |
12 | ||
13 | CA1 = S1/ca_chain.pem | |
14 | CERT1 = S1/server1.example.com.pem | |
15 | KEY1 = S1/server1.example.com.unlocked.key | |
16 | CA2 = FX/cert2 | |
17 | CERT2 = FX/cert2 | |
18 | KEY2 = FX/cert2 | |
19 | ||
20 | # ----- Main settings ----- | |
21 | ||
54dcc2cc JH |
22 | disable_ipv6 = true |
23 | ||
e51c7be2 JH |
24 | acl_smtp_rcpt = accept |
25 | ||
26 | log_selector = +tls_peerdn+tls_certificate_verified | |
27 | ||
28 | queue_only | |
29 | queue_run_in_order | |
30 | ||
31 | tls_advertise_hosts = * | |
32 | ||
33 | # Set certificate only if server | |
34 | ||
35 | tls_certificate = ${if eq {SERVER}{server}{CERT1}fail} | |
36 | tls_privatekey = ${if eq {SERVER}{server}{KEY1}fail} | |
37 | ||
38 | tls_verify_hosts = * | |
39 | tls_verify_certificates = ${if eq {SERVER}{server}{CERT2}fail} | |
40 | ||
41 | ||
42 | # ----- Routers ----- | |
43 | ||
44 | begin routers | |
45 | ||
46 | server_dump: | |
47 | driver = redirect | |
48 | condition = ${if eq {SERVER}{server}{yes}{no}} | |
49 | data = :blackhole: | |
50 | ||
51 | client_x: | |
52 | driver = accept | |
53 | local_parts = userx | |
54 | retry_use_local_part | |
55 | transport = send_to_server_failcert | |
56 | errors_to = "" | |
57 | ||
58 | client_y: | |
59 | driver = accept | |
60 | local_parts = usery | |
61 | retry_use_local_part | |
62 | transport = send_to_server_retry | |
63 | ||
64 | client_z: | |
65 | driver = accept | |
66 | local_parts = userz | |
67 | retry_use_local_part | |
68 | transport = send_to_server_crypt | |
69 | ||
70 | client_q: | |
71 | driver = accept | |
72 | local_parts = userq | |
73 | retry_use_local_part | |
74 | transport = send_to_server_req_fail | |
75 | ||
76 | client_r: | |
77 | driver = accept | |
78 | local_parts = userr | |
79 | retry_use_local_part | |
80 | transport = send_to_server_req_failname | |
81 | ||
82 | client_s: | |
83 | driver = accept | |
84 | local_parts = users | |
85 | retry_use_local_part | |
86 | transport = send_to_server_req_passname | |
87 | ||
aa2a70ba JH |
88 | client_t: |
89 | driver = accept | |
90 | local_parts = usert | |
91 | retry_use_local_part | |
92 | transport = send_to_server_req_failcarryon | |
93 | ||
e51c7be2 JH |
94 | |
95 | # ----- Transports ----- | |
96 | ||
97 | begin transports | |
98 | ||
99 | # this will fail to verify the cert at HOSTIPV4 so fail the crypt requirement | |
100 | send_to_server_failcert: | |
101 | driver = smtp | |
102 | allow_localhost | |
103 | hosts = HOSTIPV4 | |
104 | hosts_require_tls = HOSTIPV4 | |
105 | port = PORT_D | |
106 | tls_certificate = CERT2 | |
107 | tls_privatekey = CERT2 | |
108 | ||
109 | tls_verify_certificates = CA2 | |
110 | ||
111 | # this will fail to verify the cert at HOSTIPV4 so fail the crypt, then retry on 127.1; ok | |
112 | send_to_server_retry: | |
113 | driver = smtp | |
114 | allow_localhost | |
115 | hosts = HOSTIPV4 : 127.0.0.1 | |
116 | hosts_require_tls = HOSTIPV4 | |
117 | port = PORT_D | |
118 | tls_certificate = CERT2 | |
119 | tls_privatekey = CERT2 | |
120 | ||
121 | tls_verify_certificates = \ | |
122 | ${if eq{$host_address}{127.0.0.1}{CA1}{CA2}} | |
123 | ||
124 | # this will fail to verify the cert but continue unverified though crypted | |
125 | send_to_server_crypt: | |
126 | driver = smtp | |
127 | allow_localhost | |
128 | hosts = HOSTIPV4 | |
129 | hosts_require_tls = HOSTIPV4 | |
130 | port = PORT_D | |
131 | tls_certificate = CERT2 | |
132 | tls_privatekey = CERT2 | |
133 | ||
134 | tls_verify_certificates = CA2 | |
135 | tls_try_verify_hosts = * | |
136 | ||
a320fabd JH |
137 | # this will fail to verify the cert at HOSTNAME and fallback to unencrypted |
138 | # Fail due to lack of correct CA | |
e51c7be2 JH |
139 | send_to_server_req_fail: |
140 | driver = smtp | |
141 | allow_localhost | |
a320fabd | 142 | hosts = HOSTNAME |
e51c7be2 JH |
143 | port = PORT_D |
144 | tls_certificate = CERT2 | |
145 | tls_privatekey = CERT2 | |
146 | ||
147 | tls_verify_certificates = CA2 | |
148 | tls_verify_hosts = * | |
149 | ||
150 | # this will fail to verify the cert name and fallback to unencrypted | |
a320fabd | 151 | # fail because the cert is "server1.example.com" and the test system is something else |
e51c7be2 JH |
152 | send_to_server_req_failname: |
153 | driver = smtp | |
154 | allow_localhost | |
a320fabd | 155 | hosts = HOSTNAME |
e51c7be2 JH |
156 | port = PORT_D |
157 | tls_certificate = CERT2 | |
158 | tls_privatekey = CERT2 | |
159 | ||
160 | tls_verify_certificates = CA1 | |
a320fabd | 161 | tls_verify_cert_hostnames = * |
e51c7be2 JH |
162 | tls_verify_hosts = * |
163 | ||
164 | # this will pass the cert verify including name check | |
a320fabd | 165 | # our stunt DNS has an A record for server1.example.com -> HOSTIPV4 |
e51c7be2 JH |
166 | send_to_server_req_passname: |
167 | driver = smtp | |
168 | allow_localhost | |
a320fabd | 169 | hosts = server1.example.com |
e51c7be2 JH |
170 | port = PORT_D |
171 | tls_certificate = CERT2 | |
172 | tls_privatekey = CERT2 | |
173 | ||
174 | tls_verify_certificates = CA1 | |
a320fabd | 175 | tls_verify_cert_hostnames = * |
e51c7be2 JH |
176 | tls_verify_hosts = * |
177 | ||
aa2a70ba JH |
178 | send_to_server_req_failcarryon: |
179 | driver = smtp | |
180 | allow_localhost | |
181 | hosts = HOSTNAME | |
182 | port = PORT_D | |
183 | tls_certificate = CERT2 | |
184 | tls_privatekey = CERT2 | |
185 | ||
186 | tls_verify_certificates = CA1 | |
187 | tls_verify_cert_hostnames = * | |
188 | tls_try_verify_hosts = * | |
189 | ||
e51c7be2 | 190 | # End |