Replies: 1 comment 2 replies
-
You could implement this with an expression, something like this: allow-invalid-certs = "contains(['broken_domain1.com', 'broken_domain2.com'], mx)" Or if you want to manage these domains from a lookup store you can use: allow-invalid-certs = "key_exists('lookup_store', mx)" |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I had an email bounce recently because a large provider has let their certificate expire (by 36 days at this point!). I don't want to set
queue.outbound.tls.allow-invalid-certs = true
because I think that would allow other types of invalid certs, like self-signed certs or other types of invalidity that could be the result of an actual MitM attack.But other mail providers (i.e. GMail) seem to be fine sending mail to this server despite the expired cert, so I'd like to relax the constraints in this one specific way.
I'd be happy to try implementing this if it's a more broadly desirable feature.
Beta Was this translation helpful? Give feedback.
All reactions