Hi,

I had misunderstood your mail and the issue when I first read this
so here's a new answer ;-)


On Tue, May 17, 2016 at 08:47:09AM +0100, John Cox wrote:
> Hi
> 
> Since I upgraded to OpenBSD 5.9 (I think) I've been getting TLS
> validation errors in the headers:
> 
>       TLS version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384
> bits=256 verify=NO
> 
> Prior to the upgrade I would get verify=YES. (I think it was the
> upgrade to OpenBSD 5.9 and whichever OpenSMTPD that comes with it that
> did it - it was certainly about that time)
> 
> I have now upgraded OpenSMTPD to the current 5.9.2 release and that
> makes no difference.
> 

Following suggestions from one of ourr libressl hackers we now only request
client certificate when 'tls-require verify' is specified.

You can see the commit and rationale here:

       
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/smtpd/ssl_smtpd.c?rev=1.10&content-type=text/x-cvsweb-markup


verify=NO is the default, the only cases where you'll get another value
is if you requested verify and it succeeded.


-- 
Gilles Chehade

https://www.poolp.org                                          @poolpOrg

-- 
You received this mail because you are subscribed to [email protected]
To unsubscribe, send a mail to: [email protected]

Reply via email to