From owner-freebsd-hackers@freebsd.org Mon Nov 28 19:19:17 2016 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7AE16C5A765 for ; Mon, 28 Nov 2016 19:19:17 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [IPv6:2001:418:3fd::f7]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "m5p.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1643513E0; Mon, 28 Nov 2016 19:19:16 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from [10.100.0.31] (haymarket.m5p.com [10.100.0.31]) by mailhost.m5p.com (8.15.2/8.15.2) with ESMTP id uASJJ9r5062939; Mon, 28 Nov 2016 14:19:15 -0500 (EST) (envelope-from george+freebsd@m5p.com) Subject: Re: Sendmail and STARTTLS To: Gregory Shapiro References: <20161128183554.GA6716@c02pp3c3fvh8.corp.proofpoint.com> Cc: freebsd-hackers@FreeBSD.org From: George Mitchell Message-ID: <2c7a5fc1-5946-1221-816f-b68079a42078@m5p.com> Date: Mon, 28 Nov 2016 14:19:09 -0500 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:45.0) Gecko/20100101 Thunderbird/45.5.0 MIME-Version: 1.0 In-Reply-To: <20161128183554.GA6716@c02pp3c3fvh8.corp.proofpoint.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-3.8 required=10.0 tests=ALL_TRUSTED, RP_MATCHES_RCVD autolearn=unavailable autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mattapan.m5p.com X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.4.3 (mailhost.m5p.com [10.100.0.247]); Mon, 28 Nov 2016 14:19:15 -0500 (EST) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Nov 2016 19:19:17 -0000 On 11/28/16 13:35, Gregory Shapiro wrote: >> Received: from mx2.freebsd.org (mx2.freebsd.org [8.8.178.116]) >> by mailhost.m5p.com (8.15.2/8.15.2) with ESMTPS id uARD0t70051256 >> (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) >> for ; Sun, 27 Nov 2016 08:01:01 -0500 (EST) >> (envelope-from owner-freebsd-hackers@freebsd.org) >> >> (When I used the default values, ssl-tools accused me of using a >> weak protocol, so I started experimenting with values gleaned from >> around the net, to no avail so far.) >> >> What am I doing wrong? How can I enter VERIFY=YES nirvana? -- George > > Verification is via these settings. You'll need a populated set of root certificates in the directory you pick. > > M4 Variable Name Configuration [Default] & Description > ================ ============= ======================= > confCACERT_PATH CACertPath [undefined] Path to directory with > certificates of CAs which must contain > their hashes as filenames or links. > confCACERT CACertFile [undefined] File containing at least > one CA certificate. Like this? define(`CERT_DIR', `/usr/local/etc/letsencrypt/live/m5p.com') define(`confCACERT_PATH', `CERT_DIR') define(`confCACERT', `CERT_DIR/chain.pem') define(`confSERVER_CERT', `CERT_DIR/cert.pem') define(`confSERVER_KEY', `CERT_DIR/privkey.pem') define(`confCLIENT_CERT', `CERT_DIR/cert.pem') define(`confCLIENT_KEY', `CERT_DIR/privkey.pem') > > Finally, review section 6.6.1 of op.me: > > % gunzip -c /usr/share/doc/smm/08.sendmailop/paper.ascii.gz | less > [...] Rechecking this now ... -- George