<feed xmlns='http://www.w3.org/2005/Atom'>
<title>interimap/tests/tls-verify-peer, branch debian/0.5.7-4</title>
<subtitle>Fast bidirectional synchronization for QRESYNC-capable IMAP servers</subtitle>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/'/>
<entry>
<title>libinterimap: use default locations for trusted CA certificates when neither CAfile nor CApath are set.</title>
<updated>2020-12-13T17:44:18+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-13T16:43:52+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=8c43ed9baa905d907a6aad77de2282a852ba69a9'/>
<id>8c43ed9baa905d907a6aad77de2282a852ba69a9</id>
<content type='text'>
In particular, OpenSSL's default locations can be overridden by the
SSL_CERT_FILE resp. SSL_CERT_DIR environment variables, see
SSL_CTX_load_verify_locations(3ssl).

This bumps the minimum OpenSSL version to 1.1.0 (when SSL_verify is
used).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In particular, OpenSSL's default locations can be overridden by the
SSL_CERT_FILE resp. SSL_CERT_DIR environment variables, see
SSL_CTX_load_verify_locations(3ssl).

This bumps the minimum OpenSSL version to 1.1.0 (when SSL_verify is
used).
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: ensure we haven't started speaking IMAP when the SSL/TLS handshake is aborted.</title>
<updated>2020-12-13T16:38:07+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-13T16:37:32+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=ba9d8af01141a6d5d5b98a0e249c311814b844a6'/>
<id>ba9d8af01141a6d5d5b98a0e249c311814b844a6</id>
<content type='text'>
(Unless STARTTLS is used to upgrade the connection.)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
(Unless STARTTLS is used to upgrade the connection.)
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: supply our own OpenSSL configuration file with MinProtocol=None.</title>
<updated>2020-12-11T17:44:13+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-11T17:28:32+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=ed263d4a380036b654525ee268db615c17d0d216'/>
<id>ed263d4a380036b654525ee268db615c17d0d216</id>
<content type='text'>
So we can test TLSv1 as well, not just TLSv1.2 and later.

Also, explicitly set ssl_min_protocol=TLSv1 in the Dovecot configuration
file (the default as of 2.3.11.3), hence running TLS tests now require
Dovecot 2.3 or later.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
So we can test TLSv1 as well, not just TLSv1.2 and later.

Also, explicitly set ssl_min_protocol=TLSv1 in the Dovecot configuration
file (the default as of 2.3.11.3), hence running TLS tests now require
Dovecot 2.3 or later.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: make SSL_verify check the hostname as well.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T18:39:10+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=265f133600e9812726a52ea3067409ed3578e882'/>
<id>265f133600e9812726a52ea3067409ed3578e882</id>
<content type='text'>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: always generate new certificates on `make test`.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T13:34:48+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=26e5c04abfb81bdcbd4d89d9f9329b8433920b26'/>
<id>26e5c04abfb81bdcbd4d89d9f9329b8433920b26</id>
<content type='text'>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: show the matching pinned SPKI in --debug mode.</title>
<updated>2020-12-11T10:20:37+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T13:28:29+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=17b263c49df682fc45f0e50cceb01db4366ad9a7'/>
<id>17b263c49df682fc45f0e50cceb01db4366ad9a7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: use a RSA certificate rather than ECDSA.</title>
<updated>2020-12-09T13:57:11+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-09T13:57:11+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=b13c9fa6f442f555af65f869b954935dae40fcc4'/>
<id>b13c9fa6f442f555af65f869b954935dae40fcc4</id>
<content type='text'>
It's arguably the most common use-case.  Generated with

  $ openssl genpkey -algorithm RSA -out tests/snippets/dovecot/dovecot.rsa.key
  $ openssl req -x509 -days 3650 -subj "/CN=InterIMAP test suite" \
        -key tests/snippets/dovecot/dovecot.rsa.key \
        -out tests/snippets/dovecot/dovecot.rsa.crt
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It's arguably the most common use-case.  Generated with

  $ openssl genpkey -algorithm RSA -out tests/snippets/dovecot/dovecot.rsa.key
  $ openssl req -x509 -days 3650 -subj "/CN=InterIMAP test suite" \
        -key tests/snippets/dovecot/dovecot.rsa.key \
        -out tests/snippets/dovecot/dovecot.rsa.crt
</pre>
</div>
</content>
</entry>
<entry>
<title>Test suite: add new tests for SSL/TLS.</title>
<updated>2019-11-13T05:23:57+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2019-11-10T04:39:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=a7c364bf90a4593cfbc7911b1b7536dc66b1c879'/>
<id>a7c364bf90a4593cfbc7911b1b7536dc66b1c879</id>
<content type='text'>
SSL connections are accepted on TCP port 10993.  Also, fix STARTTLS
directive, broken since fba1c36…
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
SSL connections are accepted on TCP port 10993.  Also, fix STARTTLS
directive, broken since fba1c36…
</pre>
</div>
</content>
</entry>
</feed>
