EXPERIMENTAL_CERTNAMES: Hostlist for cert name checks should match host
[users/heiko/exim.git] / test / confs / 5450
1 # Exim test configuration 5450
2 # TLS client: verify certificate from server - name-fails
3
4 SERVER=
5
6 exim_path = EXIM_PATH
7 host_lookup_order = bydns
8 primary_hostname = myhost.test.ex
9 rfc1413_query_timeout = 0s
10 spool_directory = DIR/spool
11 log_file_path = DIR/spool/log/SERVER%slog
12 gecos_pattern = ""
13 gecos_name = CALLER_NAME
14
15 FX = DIR/aux-fixed
16 S1 = FX/exim-ca/example.com/server1.example.com
17
18 CA1 =   S1/ca_chain.pem 
19 CERT1 = S1/server1.example.com.pem
20 KEY1 =  S1/server1.example.com.unlocked.key
21 CA2 =   FX/cert2
22 CERT2 = FX/cert2
23 KEY2 =  FX/cert2
24
25 # ----- Main settings -----
26
27 acl_smtp_rcpt = accept
28
29 log_selector =  +tls_peerdn+tls_certificate_verified
30
31 queue_only
32 queue_run_in_order
33
34 tls_advertise_hosts = *
35
36 # Set certificate only if server
37
38 tls_certificate = ${if eq {SERVER}{server}{CERT1}fail}
39 tls_privatekey = ${if eq {SERVER}{server}{KEY1}fail}
40
41 tls_verify_hosts = *
42 tls_verify_certificates = ${if eq {SERVER}{server}{CERT2}fail}
43
44
45 # ----- Routers -----
46
47 begin routers
48
49 server_dump:
50   driver = redirect
51   condition = ${if eq {SERVER}{server}{yes}{no}}
52   data = :blackhole:
53
54 client_x:
55   driver = accept
56   local_parts = userx
57   retry_use_local_part
58   transport = send_to_server_failcert
59   errors_to = ""
60
61 client_y:
62   driver = accept
63   local_parts = usery
64   retry_use_local_part
65   transport = send_to_server_retry
66
67 client_z:
68   driver = accept
69   local_parts = userz
70   retry_use_local_part
71   transport = send_to_server_crypt
72
73 client_q:
74   driver = accept
75   local_parts = userq
76   retry_use_local_part
77   transport = send_to_server_req_fail
78
79 client_r:
80   driver = accept
81   local_parts = userr
82   retry_use_local_part
83   transport = send_to_server_req_failname
84
85 client_s:
86   driver = accept
87   local_parts = users
88   retry_use_local_part
89   transport = send_to_server_req_passname
90
91
92 # ----- Transports -----
93
94 begin transports
95
96 # this will fail to verify the cert at HOSTIPV4 so fail the crypt requirement
97 send_to_server_failcert:
98   driver = smtp
99   allow_localhost
100   hosts = HOSTIPV4
101   hosts_require_tls = HOSTIPV4
102   port = PORT_D
103   tls_certificate = CERT2
104   tls_privatekey = CERT2
105
106   tls_verify_certificates = CA2
107
108 # this will fail to verify the cert at HOSTIPV4 so fail the crypt, then retry on 127.1; ok
109 send_to_server_retry:
110   driver = smtp
111   allow_localhost
112   hosts = HOSTIPV4 : 127.0.0.1
113   hosts_require_tls = HOSTIPV4
114   port = PORT_D
115   tls_certificate = CERT2
116   tls_privatekey = CERT2
117
118   tls_verify_certificates = \
119     ${if eq{$host_address}{127.0.0.1}{CA1}{CA2}}
120
121 # this will fail to verify the cert but continue unverified though crypted
122 send_to_server_crypt:
123   driver = smtp
124   allow_localhost
125   hosts = HOSTIPV4
126   hosts_require_tls = HOSTIPV4
127   port = PORT_D
128   tls_certificate = CERT2
129   tls_privatekey = CERT2
130
131   tls_verify_certificates = CA2
132   tls_try_verify_hosts = *
133
134 # this will fail to verify the cert at HOSTNAME and fallback to unencrypted
135 # Fail due to lack of correct CA
136 send_to_server_req_fail:
137   driver = smtp
138   allow_localhost
139   hosts = HOSTNAME
140   port = PORT_D
141   tls_certificate = CERT2
142   tls_privatekey = CERT2
143
144   tls_verify_certificates = CA2
145   tls_verify_hosts = *
146
147 # this will fail to verify the cert name and fallback to unencrypted
148 # fail because the cert is "server1.example.com" and the test system is something else
149 send_to_server_req_failname:
150   driver = smtp
151   allow_localhost
152   hosts = HOSTNAME
153   port = PORT_D
154   tls_certificate = CERT2
155   tls_privatekey = CERT2
156
157   tls_verify_certificates = CA1
158   tls_verify_cert_hostnames = *
159   tls_verify_hosts = *
160
161 # this will pass the cert verify including name check
162 # our stunt DNS has an A record for server1.example.com -> HOSTIPV4
163 send_to_server_req_passname:
164   driver = smtp
165   allow_localhost
166   hosts = server1.example.com
167   port = PORT_D
168   tls_certificate = CERT2
169   tls_privatekey = CERT2
170
171   tls_verify_certificates = CA1
172   tls_verify_cert_hostnames = *
173   tls_verify_hosts = *
174
175 # End