DANE: do not override a cert verify failure, in callback. Also fix some test mistakes
[exim.git] / test / log / 5710
CommitLineData
9d1c15ef
JH
11999-03-02 09:44:33 10HmaX-0005vi-00 <= CALLER@myhost.test.ex U=CALLER P=local S=sss
21999-03-02 09:44:33 10HmaY-0005vi-00 <= CALLER@myhost.test.ex U=CALLER P=local S=sss
31999-03-02 09:44:33 Start queue run: pid=pppp -qf
a7538db1 41999-03-02 09:44:33 10HmaX-0005vi-00 tls:cert depth=0 <CN=server1.example.com>
c562fd30 51999-03-02 09:44:33 10HmaX-0005vi-00 H=127.0.0.1 [127.0.0.1] TLS error on connection (certificate verification failed): certificate invalid
a7538db1
JH
61999-03-02 09:44:33 10HmaX-0005vi-00 msg:host:defer bad
71999-03-02 09:44:33 10HmaX-0005vi-00 NO CLIENT CERT presented
9d1c15ef
JH
81999-03-02 09:44:33 10HmaX-0005vi-00 Peer cert:
91999-03-02 09:44:33 10HmaX-0005vi-00 ver <3>
101999-03-02 09:44:33 10HmaX-0005vi-00 SN <CN=server1.example.com>
bfbad1dd
JH
111999-03-02 09:44:33 10HmaX-0005vi-00 SN; <CN=server1.example.com>
121999-03-02 09:44:33 10HmaX-0005vi-00 SNCN<server1.example.com>
9d1c15ef 131999-03-02 09:44:33 10HmaX-0005vi-00 IN <O=example.com,CN=clica Signing Cert>
f2f2c91b
JH
141999-03-02 09:44:33 10HmaX-0005vi-00 NB <Nov 1 12:34:38 2012 GMT>
151999-03-02 09:44:33 10HmaX-0005vi-00 NA <Jan 1 12:34:38 2038 GMT>
161999-03-02 09:44:33 10HmaX-0005vi-00 SA <RSA-SHA256>
171999-03-02 09:44:33 10HmaX-0005vi-00 SG <3e 56 25 52 5c 4b 79 c7 93 e2 46 ea 42 35 25 27 41 9d ad 29 98 e2 f6 9b 32 bb 1c e9 6a 68 81 ba a7 82 7f 3d f8 d5 4a a6 98 af e4 78 31 bf 41 7a 3b 61 1a c8 f6 9e 77 c6 f1 ea 97 fc 2b c8 50 78 c3 15 33 23 46 63 b9 f3 04 cc 08 68 36 e3 2b cf 52 66 95 9e ef f0 38 c0 7c f4 42 b3 a6 e6 40 52 de 1b 15 1a 5d e7 76 5c 31 ec bc 60 50 03 51 6e 9f 49 bf 28 a2 e7 4d 6d ce 95 06 55 a0 81 21 49>
181999-03-02 09:44:33 10HmaX-0005vi-00 SAN <DNS=server1.example.com\nDNS=alternatename.server1.example.com\nDNS=*.test.ex\nDNS=alternatename2.server1.example.com>
9d1c15ef
JH
191999-03-02 09:44:33 10HmaX-0005vi-00 CRU <http://crl.example.com/latest.crl>
201999-03-02 09:44:33 10HmaX-0005vi-00 TLS session failure: delivering unencrypted to 127.0.0.1 [127.0.0.1] (not in hosts_require_tls)
211999-03-02 09:44:33 10HmaX-0005vi-00 => bad@test.ex R=client T=send_to_server H=127.0.0.1 [127.0.0.1] C="250 OK id=10HmaZ-0005vi-00"
a7538db1
JH
221999-03-02 09:44:33 10HmaX-0005vi-00 msg:delivery bad
231999-03-02 09:44:33 10HmaX-0005vi-00 NO CLIENT CERT presented
9d1c15ef
JH
241999-03-02 09:44:33 10HmaX-0005vi-00 No Peer cert
251999-03-02 09:44:33 10HmaX-0005vi-00 Completed
a7538db1 261999-03-02 09:44:33 10HmaY-0005vi-00 tls:cert depth=0 <CN=server1.example.com>
6d580f19 271999-03-02 09:44:33 10HmaY-0005vi-00 => good@test.ex R=client T=send_to_server H=127.0.0.1 [127.0.0.1] X=TLS1.x:xxxxRSA_AES_256_CBC_SHAnnn:256 CV=yes DN="CN=server1.example.com" C="250 OK id=10HmbA-0005vi-00"
a7538db1 281999-03-02 09:44:33 10HmaY-0005vi-00 msg:delivery good
9d1c15ef
JH
291999-03-02 09:44:33 10HmaY-0005vi-00 Our cert SN: CN=server2.example.com
301999-03-02 09:44:33 10HmaY-0005vi-00 Peer cert:
311999-03-02 09:44:33 10HmaY-0005vi-00 ver <3>
321999-03-02 09:44:33 10HmaY-0005vi-00 SN <CN=server1.example.com>
bfbad1dd
JH
331999-03-02 09:44:33 10HmaY-0005vi-00 SN; <CN=server1.example.com>
341999-03-02 09:44:33 10HmaY-0005vi-00 SNCN<server1.example.com>
9d1c15ef 351999-03-02 09:44:33 10HmaY-0005vi-00 IN <O=example.com,CN=clica Signing Cert>
f2f2c91b
JH
361999-03-02 09:44:33 10HmaY-0005vi-00 NB <Nov 1 12:34:38 2012 GMT>
371999-03-02 09:44:33 10HmaY-0005vi-00 NA <Jan 1 12:34:38 2038 GMT>
381999-03-02 09:44:33 10HmaY-0005vi-00 SA <RSA-SHA256>
391999-03-02 09:44:33 10HmaY-0005vi-00 SG <3e 56 25 52 5c 4b 79 c7 93 e2 46 ea 42 35 25 27 41 9d ad 29 98 e2 f6 9b 32 bb 1c e9 6a 68 81 ba a7 82 7f 3d f8 d5 4a a6 98 af e4 78 31 bf 41 7a 3b 61 1a c8 f6 9e 77 c6 f1 ea 97 fc 2b c8 50 78 c3 15 33 23 46 63 b9 f3 04 cc 08 68 36 e3 2b cf 52 66 95 9e ef f0 38 c0 7c f4 42 b3 a6 e6 40 52 de 1b 15 1a 5d e7 76 5c 31 ec bc 60 50 03 51 6e 9f 49 bf 28 a2 e7 4d 6d ce 95 06 55 a0 81 21 49>
401999-03-02 09:44:33 10HmaY-0005vi-00 SAN <DNS=server1.example.com\nDNS=alternatename.server1.example.com\nDNS=*.test.ex\nDNS=alternatename2.server1.example.com>
9d1c15ef
JH
411999-03-02 09:44:33 10HmaY-0005vi-00 CRU <http://crl.example.com/latest.crl>
421999-03-02 09:44:33 10HmaY-0005vi-00 Completed
431999-03-02 09:44:33 End queue run: pid=pppp -qf
44
45******** SERVER ********
461999-03-02 09:44:33 exim x.yz daemon started: pid=pppp, no queue runs, listening for SMTP on port 1225
723fe533 471999-03-02 09:44:33 [127.0.0.1] depth=0 CN=server2.example.com
9d1c15ef
JH
481999-03-02 09:44:33 TLS error on connection from localhost [127.0.0.1] (recv): A TLS fatal alert has been received.: Certificate is bad
491999-03-02 09:44:33 TLS error on connection from localhost [127.0.0.1] (send): The specified session has been invalidated for some reason.
501999-03-02 09:44:33 10HmaZ-0005vi-00 <= CALLER@myhost.test.ex H=localhost (myhost.test.ex) [127.0.0.1] P=esmtp S=sss id=E10HmaX-0005vi-00@myhost.test.ex
723fe533 511999-03-02 09:44:33 [127.0.0.1] depth=0 CN=server2.example.com
6d580f19 521999-03-02 09:44:33 10HmbA-0005vi-00 <= CALLER@myhost.test.ex H=localhost (myhost.test.ex) [127.0.0.1] P=esmtps X=TLS1.x:xxxxRSA_AES_256_CBC_SHAnnn:256 CV=yes DN="CN=server2.example.com" S=sss id=E10HmaY-0005vi-00@myhost.test.ex