Commit Briefs

Omar Polo

copyright years++


Omar Polo

implement `listen on'

Listening by default on all the addresses is so bad I don't know why I haven't changed this before. Anyway. Add a `listen on $hostname port $port' syntax to the config file and deprecate the old "port" and "ipv6" global setting. Still try to honour them when no "listen on" directive is used for backward compatibily, but this will go away in the next next version hopefully. At the moment the `listen on' in server context don't filter the host, i.e. one can still reach a host from a address not specified in the corresponding `liste on', this will be added later.


Omar Polo

load_ca: get a buffer instead of a fd

We dup(1) the ca fd and send it to various processes, so they fail loading it. Instead, use load_file to get a buffer with the file content and pass that to load_ca which then loads via BIO.


Omar Polo

fixes for -Wpointer-sign


Omar Polo

add a privsep crypto engine

Incorporate the OpenSMTPD' privsep crypto engine. The idea behind it is to never load the certificate' private keys in a networked process, instead they are loaded in a separate process (the `crypto' one) which signs payloads on the behalf of the server processes. This way, we greatly reduce the risk of leaking the certificate' private key should the server process be compromised. This currently compiles only on LibreSSL (portable fix is in the way).



Omar Polo

readd proxy certs and `require client ca' support

Was temporarly disabled during the transition to real privsep. While here, fix a memory leak when using `require client ca'. Also, avoid leaking info about the parent address space layout to server processes by not sending pointer values.



Omar Polo

drop now unused dispatch_imsg


Omar Polo

switch to the more usual log.c


Omar Polo

rename log.[ch] to logger.[ch]


Omar Polo

provide a more usual fatal

fatal usually appends the error string. Add 'fatalx' that doesn't. Fix callers and move the prototypes to log.h



Omar Polo

fmt


Omar Polo

certificate generation (bugfix and improvement)

don't add gmid as organisation when generating the certificate, and set the version to 3, so it's compatible with java/android clients. Found by Gnuserland, thanks!