> On 02 Feb 2016, at 14:19, Timo Sirainen <t...@iki.fi> wrote:
> 
> On 02 Feb 2016, at 13:09, Haravikk <dove...@haravikk.me> wrote:
>> 
>> So I still haven’t found a way to require client certificates only for port 
>> 993/IMAPS while leaving unencrypted IMAP open for local, trusted, services.
>> 
>> Is there really no way to do this? I just found out how to do the same thing 
>> for postfix (turns out it’s fairly easy, just a matter of adding the 
>> settings in the right parts of master.cf instead of main.cf), allowing me to 
>> restrict client certificate verification to port 587 (I don’t accept port 
>> 465) without interfering with incoming mail server connections on port 25.
> 
> If you really want to do it, you could do it something like this (not tested 
> - probably needs some additions/changes):

Oh, except now you have two auth master processes, so the final userdb lookup 
would have to go to the right auth process. This requires the attached patch. 
After that you can do:

# no 993 port for this imap-login
service imap-login {
 inet_listener imaps {
   port = 0
 }
}

# create a duplicate 993 service
service imap-login-ssl {
 executable = imap-login -P imap-ssl login-ssl
 chroot = login
 user = $default_login_user
 # add other settings similarly as to service imap-login
 inet_listener imaps {
   port = 993
 }
}

service imap-ssl {
  executable = imap -S auth-master-ssl
  unix_listener login/imap-ssl {
    user = $default_login_user
  }
}

# create a separate auth master process for port 993
service auth-ssl {
 executable = auth -o auth_ssl_require_client_cert=yes
 # add other settings similarly as to service auth
 unix_listener login/login-ssl {
   mode = 0666
 }
 unix_listener auth-master-ssl {
 }
}

Attachment: multi-auth-master.diff
Description: Binary data

Reply via email to