Displaying 4 results from an estimated 4 matches for "ssl_proxy_get_peer_nam".
Did you mean:
ssl_proxy_get_peer_name
2007 Aug 30
1
Using NID_x500UniqueIdentifier as ssl_username_from_cert
Hi,
please have a look at the attached patch for
dovecot-1.0.3
These patch modifies ssl_proxy_get_peer_name()
to use the NID_x500UniqueIdentifier as username
instead of NID_commonName.
The reason is, that the Common Name doesn't have
to be unique for the whole mailserver.
Example; in germany a lot of people got the
first name "Andreas" and the last name "Schulz".
Therefore a lo...
2006 May 11
0
mandatory client certificates and crl check in ssl-proxy-openssl.c
...lo,
I made a modification to ssl-proxy-openssl.c (patch attached) zo that it
a) disconnects when no client certificate is presented
b) checks the client certificate against the crl for our root cert. (so
you can't use a revoked client cert.)
c) returns the CommonName from the client cert. in
ssl_proxy_get_peer_name (this way it's easier to use dovecot as
imap-proxy with a passwd-like userdb, ssl_require_client_cert and
ssl_username_from_cert, it "binds" the emailuser to the
clientcertificate, a clientcert. can access only the account from the
userdb)
in order to use it, the CAfile must be...
2006 Jun 01
1
ssl-proxy: client certificates and crl check
Skipped content of type multipart/alternative-------------- next part --------------
--- ssl-proxy-openssl.c.orig 2006-04-04 10:32:58.000000000 +0200
+++ ssl-proxy-openssl.c 2006-06-01 09:24:57.000000000 +0200
@@ -498,7 +498,7 @@
const char *ssl_proxy_get_peer_name(struct ssl_proxy *proxy)
{
X509 *x509;
- char buf[1024];
+ char buf[256];
const char *name;
if (!ssl_proxy_has_valid_client_cert(proxy))
@@ -508,10 +508,16 @@
if (x509 == NULL)
return NULL; /* we should have had it.. */
- X509_NAME_oneline(X509_get_subject_name(x509), buf, sizeof(b...
2006 Jul 07
2
Authentication by certificats (a bug or my misconfiguration)
Today I've been trying to get dovecot (1.0 rc2) to use certificates
for client side authentication. If my memory serves right, beta8
had no problems with it (although it was some time ago and on different
machine).
Similar setup works perfectly well for postfix (for authentication
that is, on the same machine). Originally I thought I overdid some
certificate settings (keyUsage, nsCertType,