ARC: fix crash on signing with missing key file
[exim.git] / test / confs / 2002
1 # Exim test configuration 2002
2
3 .include DIR/aux-var/tls_conf_prefix
4
5 timezone = UTC
6 primary_hostname = myhost.test.ex
7
8 # ----- Main settings -----
9
10 acl_smtp_rcpt = check_recipient
11
12 log_selector = +tls_peerdn
13
14 queue_only
15 queue_run_in_order
16
17 tls_advertise_hosts = 127.0.0.1 : HOSTIPV4
18
19 CA = DIR/aux-fixed/exim-ca
20 DRSA = CA/example.com
21 DECDSA = CA/example_ec.com
22
23 tls_certificate = DRSA/server1.example.com/server1.example.com.pem \
24                 : DECDSA/server1.example_ec.com/server1.example_ec.com.pem
25 tls_privatekey =  DRSA/server1.example.com/server1.example.com.unlocked.key \
26                 : DECDSA/server1.example_ec.com/server1.example_ec.com.unlocked.key
27
28 tls_verify_hosts = HOSTIPV4
29 tls_verify_certificates = DRSA/server2.example.com/ca_chain.pem
30
31
32 # ------ ACL ------
33
34 begin acl
35
36 check_recipient:
37   accept  hosts = :
38   deny    hosts = HOSTIPV4
39          !encrypted = *
40   warn    logwrite =  ${if def:tls_in_ourcert \
41                 {Our cert SN: <${certextract{subject}{$tls_in_ourcert}}>} \
42                 {We did not present a cert}}
43   accept  condition = ${if !def:tls_in_peercert}
44           logwrite =  Peer did not present a cert
45   accept  logwrite =  Peer cert:
46           logwrite =  ver ${certextract {version}{$tls_in_peercert}}
47           logwrite =  SR  <${certextract {serial_number}{$tls_in_peercert}}>
48           logwrite =  SN  <${certextract {subject}      {$tls_in_peercert}}>
49           logwrite =  IN  <${certextract {issuer}       {$tls_in_peercert}}>
50           logwrite =  IN/O <${certextract {issuer,O}    {$tls_in_peercert}}>
51           logwrite =  NB/r <${certextract {notbefore,raw}       {$tls_in_peercert}}>
52           logwrite =  NB   <${certextract {notbefore}   {$tls_in_peercert}}>
53           logwrite =  NB/i <${certextract {notbefore,int}{$tls_in_peercert}}>
54           logwrite =  NA/i <${certextract {notafter,int}        {$tls_in_peercert}}>
55           logwrite =  NA   <${certextract {notafter}    {$tls_in_peercert}}>
56           logwrite =  SA  <${certextract {sig_algorithm}{$tls_in_peercert}}>
57           logwrite =  SG  <${certextract {signature}    {$tls_in_peercert}}>
58           logwrite =       ${certextract {subj_altname} {$tls_in_peercert} {SAN <$value>}{(no SAN)}}
59 #         logwrite =       ${certextract {ocsp_uri}     {$tls_in_peercert} {OCU <$value>}{(no OCU)}}
60           logwrite =       ${certextract {crl_uri}      {$tls_in_peercert} {CRU <$value>}{(no CRU)}}
61           logwrite =  md5    fingerprint ${md5:$tls_in_peercert}
62           logwrite =  sha1   fingerprint ${sha1:$tls_in_peercert}
63           logwrite =  sha256 fingerprint ${sha256:$tls_in_peercert}
64           logwrite =  der_b64 ${base64:$tls_in_peercert}
65
66
67 # ----- Routers -----
68
69 begin routers
70
71 abc:
72   driver = accept
73   retry_use_local_part
74   transport = local_delivery
75   headers_add = tls-certificate-verified: $tls_certificate_verified
76
77
78 # ----- Transports -----
79
80 begin transports
81
82 local_delivery:
83   driver = appendfile
84   file = DIR/test-mail/$local_part
85   headers_add = TLS: cipher=$tls_cipher peerdn=$tls_peerdn
86   user = CALLER
87
88 # End