SNI Config

Paul Kudla (SCOM.CA Internet Services Inc.) paul at scom.ca
Wed Oct 12 10:54:10 UTC 2022


ok thanks for your input

I finally tracked down the issue

It was how i was loading the certificates in the first place

that being said (and i must have missed this) 2.3.18 seems to allow 
importing a cert from a program

thus sni config

local_name mail.paulkudla.net {
   ssl_key =/programs/common/getssl.cert -k mail.paulkudla.net -q yes
   ssl_cert =/programs/common/getssl.cert -r mail.paulkudla.net -q yes
   ssl_ca =/programs/common/getssl.cert -i mail.paulkudla.net -q yes
}

would work instead of file pipes from individual text files.


#local_name mail.paulkudla.net {
#  ssl_key =</usr/local/etc/dovecot/pk.key
#  ssl_cert =</usr/local/etc/dovecot/pk.crt
#  ssl_ca =</usr/local/etc/dovecot/pk.ca
#}

2.3.19 apparently no longer supports this?

aki is there a way to pipe the cert from a program file (as indicated above)

I am sure you can appreciate generating files for 1000+ ssl certs can 
become a nightmare management wise

either that or a pgsql select ?

I have gone back to text files in the mean time ?



Happy Wednesday !!!
Thanks - paul

Paul Kudla


Scom.ca Internet Services <http://www.scom.ca>
004-1009 Byron Street South
Whitby, Ontario - Canada
L1N 4S3

Toronto 416.642.7266
Main 1.866.411.7266
Fax 1.888.892.7266
Email paul at scom.ca

On 10/11/2022 12:46 PM, Jochen Bern wrote:
> 
> On 11.10.22 17:46, Paul Kudla (SCOM.CA Internet Services Inc.) wrote:
>> ok according to
>> https://www.openssl.org/docs/man1.0.2/man5/x509v3_config.html
>> SAN is not a valid option along with CN
> 
> ... I don't see that being said in the page you refer to?
> 
> Anyhow, "stop giving a CN, use SANs instead" is a rather recent 
> development coming from the CA/Browser Forum - and IIUC still not a 
> *requirement*, not even for web browsers/servers. I would be surprised 
> if OpenSSL (already) were trying to enforce that policy.
> 
> Hmmm, what's our company's "IMAPS server" throwing at my TB again ... ?
> 
>> $ openssl s_client -connect outlook.office365.com:993 -showcerts | 
>> openssl x509 -noout -text
> [...]
>>         Subject: C = US, ST = Washington, L = Redmond, O = Microsoft 
>> Corporation, CN = outlook.com
> [...]
>>             X509v3 Subject Alternative Name:                 
>> DNS:*.clo.footprintdns.com, DNS:*.hotmail.com, 
>> DNS:*.internal.outlook.com, [...]
> 
> ... yeah, no, nothing that Thunderbird (from 69-ish to 102) should get 
> indigestion over.
> 
>> Upoin further testing thunderbird seems to be locking onto the primary 
>> domain (*.scom.ca) of the server skipp any sni setup ??
> 
> You might want to get a network trace of your Thunderbird talking to the 
> server to see what cert actually is presented by the server, and 
> ideally, what domain is requested by SNI (if at all). That all happens 
> before the connection starts to be encrypted, so you should be able to 
> read it (say, with Wireshark) without having to crack any crypto ...
> 
> Kind regards,


More information about the dovecot mailing list