Bug#446036: exim4: please compile against openssl instead of gnutls

Simon Josefsson simon at josefsson.org
Thu Jan 3 21:41:35 UTC 2008


Hi!  I'm commenting one thing only in this post, prompted by
<http://lists.gnu.org/archive/html/gnutls-devel/2008-01/msg00004.html>.

> and most importantly for me, openssl actually supports full
> certificate chain lookups, so you can be guaranteed that this cert was
> signed was signed by that ca.  gnutls does not, to the best of my
> knowledge.

That is not true.  GnuTLS can verify that the client certificate chains
back to the CA, and has been doing so for a long time (before I became
GnuTLS maintainer).  Naturally, the application needs to do the right
thing to trigger that feature, but there are examples and documentation
on how to do it.  I looked in the source for exim4 in src/tls-gnu.c
which contains:

/* Called after a successful handshake, when certificate verification is
required or optional, for both server and client.

Arguments:
  session    GNUTLS session
  error      where to put text giving a reason for failure

Returns:     TRUE/FALSE
*/

static BOOL
verify_certificate(gnutls_session session, uschar **error)

The function calls the relevant gnutls function,
gnutls_certificate_verify_peers.  It looks reasonable correct, although
I did not audit the code.

My conclusion is that the feature is implemented by exim4, and if there
is any problem in this area, it would be a bug.  Can you provide more
information on what made you reach the conclusion above?

/Simon





More information about the Pkg-exim4-maintainers mailing list