summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'net-mail/qmail/files/1.03-r10/tls-patch.txt')
-rw-r--r--net-mail/qmail/files/1.03-r10/tls-patch.txt105
1 files changed, 0 insertions, 105 deletions
diff --git a/net-mail/qmail/files/1.03-r10/tls-patch.txt b/net-mail/qmail/files/1.03-r10/tls-patch.txt
deleted file mode 100644
index 11b29a778f89..000000000000
--- a/net-mail/qmail/files/1.03-r10/tls-patch.txt
+++ /dev/null
@@ -1,105 +0,0 @@
-Frederik Vermeulen <qmail-tls akrul inoa.net> 20021228
-http://inoa.net/qmail/qmail-1.03-tls.patch
-
-This patch implements RFC2487 in qmail. This means you can
-get SSL or TLS encrypted and authenticated SMTP between
-the MTAs and from MUA to MTA.
-The code is considered experimental (but has worked for
-many since its first release on 1999-03-21).
-
-Usage: - install OpenSSL-0.9.6g http://www.openssl.org/
- (any 0.9.6 version is presumed to work)
- - apply patch to qmail-1.03 http://www.qmail.org/
- The patches to qmail-remote.c
- and qmail-smtpd.c can be applied separately.
- - provide a server certificate in /var/qmail/control/servercert.pem.
- "make cert" makes a self-signed certificate.
- "make cert-req" makes a certificate request.
- Note: you can add the CA certificate and intermediate
- certs to the end of servercert.pem.
- - replace qmail-smtpd and/or qmail-remote binary
- - verify operation (header information should show
- something like
- "Received [..] with DES-CBC3-SHA encrypted SMTP;")
- If you don't have a server to test with, you can test
- by sending mail to tag-ping@tbs-internet.com,
- which will bounce your mail.
-
-Optional: - when DEBUG is defined, some extra TLS info will be logged
- - qmail-remote will authenticate with the certificate in
- /var/qmail/control/clientcert.pem. By preference this is
- the same as servercert.pem, where nsCertType should be
- == server,client or be a generic certificate (no usage specified).
- - when a 512 RSA key is provided in /var/qmail/control/rsa512.pem,
- this key will be used instead of on-the-fly generation by
- qmail-smtpd. Periodical replacement can be done by crontab:
- 01 01 * * * umask 0077; /usr/local/ssl/bin/openssl genrsa \
- -out /var/qmail/control/rsa512.new 512 > /dev/null 2>&1 &&\
- chown qmaild:qmail /var/qmail/control/rsa512.new && /bin/mv -f \
- /var/qmail/control/rsa512.new /var/qmail/control/rsa512.pem
- - server authentication:
- qmail-remote requires authentication from servers for which
- /var/qmail/control/tlshosts/host.dom.ain.pem exists.
- The .pem file contains the validating CA certificates
- (or self-signed server certificate).
- CommonName has to match.
- WARNING: this option may cause mail to be delayed, bounced,
- doublebounced, and lost.
- - client authentication:
- when relay rules would reject an incoming mail,
- qmail-smtpd can allow the mail based on a presented cert.
- Certs are verified against a CA list in
- /var/qmail/control/clientca.pem (eg. http://www.modssl.org/
- source/cvs/exp/mod_ssl/pkg.mod_ssl/pkg.sslcfg/ca-bundle.crt)
- and the cert email-address has to match a line in
- /var/qmail/control/tlsclients. This email-address is logged
- in the headers.
- - cipher selection:
- qmail-remote:
- openssl cipher string (`man ciphers`) read from
- /var/qmail/control/tlsclientciphers
- qmail-smtpd:
- openssl cipher string read from TLSCIPHERS environment variable
- (can vary based on client IP address e.g.)
- or if that is not available /var/qmail/control/tlsserverciphers
- - smtps (deprecated SMTP over TLS via port 465):
- qmail-remote: when connecting to port 465
- qmail-smtpd: when SMTPS environment variable is not empty
-
-Caveats: - do a `make clean` after patching
- - binaries dynamically linked with current openssl versions need
- recompilation when the shared openssl libs are upgraded.
- - this patch could conflict with other patches (notably those
- replacing \n with \r\n, which is a bad idea on encrypted links).
- - some broken servers have a problem with TLSv1 compatibility.
- Uncomment the line where we set the SSL_OP_NO_TLSv1 option.
- - needs working /dev/urandom (or EGD for openssl versions >0.9.7)
- for seeding random number generator.
- - packagers should make sure that installing without a valid
- servercert is impossible
- - when applied in combination with AUTH patch, AUTH patch
- should be applied first and first part of this patch
- will fail. This error can be ignored. Packagers should
- cut the first 12 lines of this patch to make a happy
- patch
-
-Copyright: GPL
- Links with OpenSSL
- Inspiration and code from examples in SSLeay (E. Young
- <eay@cryptsoft.com> and T. Hudson <tjh@cryptsoft.com>),
- stunnel (M. Trojnara <mtrojnar@ddc.daewoo.com.pl>),
- Postfix/TLS (L. Jaenicke <Lutz.Jaenicke@aet.tu-cottbus.de>),
- modssl (R. Engelschall <rse@engelschall.com>),
- openssl examples of E. Rescorla <ekr@rtfm.com>.
- Debug code, tlscipher selection, many feature suggestions,
- French docs https://www.TBS-internet.com/ssl/qmail-tls.html
- from Jean-Philippe Donnio <tag-ssl@tbs-internet.com>.
- Openssl usage consulting from B. M"oller <bmoeller@acm.org>.
- Bug report from A. Dustman <adustman@comstar.net>.
- Ssl_timeoutio functions (non-blocking io, timeouts), smtps,
- auth, qmtp, mxps patch compatibility, man pages, code cleanup,
- improved error reporting, RFC2595 server identity check
- from A. Meltzer <albertikm (a) hotmail.com>.
- Bug report from Niall Richard Murphy, Tim Helton.
-
-Bug reports: mailto:<jos-tls@kotnet.org>