This one time, at band camp, Andreas Metzler said:
> On 2009-04-05 Stephen Gran <sg...@debian.org> wrote:
> have just tried to reproduce this. Both sides are running lenny. The
> client is running basically the vanilla debian config with these
> changes:
> 
> The testserver is also running on port 1111 with a self-signed certificate,
> it has set tls_try_verify_hosts = * and
>  tls_verify_certificates = afile/with/just/theclientcert.

I am using it with the ca.crt in that file, as I'm interested in
validating more than just a single client cert.

> *  Server: *
> 31998 host in tls_try_verify_hosts? yes (matched "*")
> 31998 initialized GnuTLS session
> 31998 SMTP>> 220 TLS go ahead
> 31998 gnutls_handshake was successful
> 31998 TLS certificate verified: peerdn=C=AT,ST=Austria,CN=client.bebt.de
> 31998 cipher: TLS1.0:RSA_AES_256_CBC_SHA1:32
> 
> Which looks fine to me. The server asks for a certificate, the
> clients sends it. I am sure to have missed something obvious. ;-)

This does not happen if the server cert presented is not signed by the
same CA as the client cert.
-- 
 -----------------------------------------------------------------
|   ,''`.                                            Stephen Gran |
|  : :' :                                        sg...@debian.org |
|  `. `'                        Debian user, admin, and developer |
|    `-                                     http://www.debian.org |
 -----------------------------------------------------------------

Attachment: signature.asc
Description: Digital signature

Reply via email to