Thanks, Mark. I clearly see the certificates from the client in sendmail's log file. Here's an example:

Jun 3 13:09:14 st sendmail[18951]: STARTTLS=server, cert-subject=/DC=com/DC=TT-eXpress/OU=Main+20Directory/CN=Mike+20Schmidt/serialNumber=17, cert-issuer=/DC=com/DC=TT-eXpress/CN=TT-eXpress+20Root+20Authority+20CA+201, verifymsg=ok

This is clearly my certificate used for the TLS connection. If I understand correctly, c-client isn't doing the TLS negociation, Microsoft SSPI is. Sometimes there's no certificate, so I guess in that case only the server cert is checked.

I must say that I'm really pleasantly surprised by the way c-clients handles this. It works beautifully. Now, all I need to do is get some control over the client certs. Overall, I find my experience with c-client to be very positive.

Thanks, Mark. I appreciate c-client more and more as I work with it.

Mike


Mark Crispin wrote:

The Windows SSL code in c-client (which uses Microsoft SSPI) doesn't attempt to do anything about client certificates. It only validates the server certificate. If client certificates are used at all in the negotiation, it is SSPI/Windows that is doing that.

If you want to try to implement client certificates, the routine that you need to modify is ssl_start() in imap-200?/src/osdep/nt/ssl_w2k.c (maybe also ssl_nt.c and ssl_old.c).

-- Mark --

http://staff.washington.edu/mrc
Science does not emerge from voting, party politics, or public debate.
Si vis pacem, para bellum.

_______________________________________________
Imap-uw mailing list
Imap-uw@u.washington.edu
https://mailman1.u.washington.edu/mailman/listinfo/imap-uw

Reply via email to