You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Proxy cannot be used, using proxy enables strict TLS checks because proxies are not trusted. It could work by remembering SPKI hash since feat: allow TLS connections with invalid certificate if the key is unchanged #8086, but we don't remember SPKI hash in the first place because OpenSSL is used and the code for saving it is for Rustls.
dclogin allows to only configure one port for IMAP and one port for SMTP
In most cases dclogin does not specify is and ss parameters for IMAP and SMTP security, this results in trying both implicit TLS and STARTTLS on the same port (
). Because in STARTTLS server talks (sends a banner) first and in implicit TLS client talks (sends TLS ClientHello), when STARTTLS is tried against implicit TLS port, connection times out after 1 minute. This is the problem in feat: support setup with only an IPv4 address, but no domain relay#919 at the moment, madmail 0.47.0 even explicitly generates is=default and ss=default for implicit TLS ports.
With #8086 key hash is remembered when TLS certificate is valid, the only problem is getting SPKI hash into storage for new domains and IP addresses. Can either extend dcaccount if it can be made compatible (probably not) or introduce another scheme with a place to put SPKI hash. It should then either be stored or passed around during the configuration, so autoconfig XML can be fetched (which is needed to configure multiple ports).
Relays with self-signed certificates (madmail, chatmail/relay#919) currently use
dcloginscheme to disable TLS checks permanently.The result of this is that:
dcloginmultiple times: feat: support setup with only an IPv4 address, but no domain relay#919 (comment)dcloginallows to only configure one port for IMAP and one port for SMTPdclogindoes not specifyisandssparameters for IMAP and SMTP security, this results in trying both implicit TLS and STARTTLS on the same port (core/src/configure/server_params.rs
Lines 108 to 120 in 6e04993
is=defaultandss=defaultfor implicit TLS ports.With #8086 key hash is remembered when TLS certificate is valid, the only problem is getting SPKI hash into storage for new domains and IP addresses. Can either extend
dcaccountif it can be made compatible (probably not) or introduce another scheme with a place to put SPKI hash. It should then either be stored or passed around during the configuration, so autoconfig XML can be fetched (which is needed to configure multiple ports).