“Domain not verifiable” #50
Loading…
Reference in New Issue
There is no content yet.
Delete Branch "%!s(<nil>)"
Deleting a branch is permanent. Although the deleted branch may exist for a short time before cleaning up, in most cases it CANNOT be undone. Continue?
After several Years I migrated my Prosody-Server from an “All-in-one-Server” (Webserver + XMPP-Server) to an XMPP-only-Server.
My Cert comes from Letsencrypt, and obviously it does only contain
xmpp.example.com
and notexample.com
.I have these
SRV
-Entries set:Conversations will not let me authenticate with my JID
test123@example.com
. Instead it complains “Domain not verifiable”. As soon as I specify the explicite Hostxmpp.example.com
in the Accountsettings everything works fine.Why is this the Case? Why does Conversations not respect the
SRV
-Entries?Server2Server-Communication behaves exactly as it should. A Message from
test456@jabber.de
directed totest123@example.com
knows which Server to contact, according to the SRV-Entries.Sidenote: I also opened a similar Issue for Gajim, which does not let me authenticate at all.
The certificate must match the domain name (the part behind the @ in your XMPP address); not the hostname.
Or more specifically it must match something the user (you) has entered. That’s why it works if you enter the hostname.
DNS (without DNSSEC) is not a trusted chain.
Edit: s2s only works because it falls back to dial back. On server that don’t have dialback s2s requires the domain name in the cert too.
But my DNSSEC is valid…
What's then the Point of those
SRV
-Entries, when they are not respected?To derive the hostname from the domain. Finding the server on the network is independent of verifying the certificate.
You can try to enable 'Validate hostname with DNSSEC' in the expert settings.
Having the domain name in the certificate is the correct(tm) setup unless you have very very good reasons not to do this.
Thanks for the Explanation. Because I recognized this is not something negotiable, I upgraded my Cert with the pure Domain, using Letsencrypt's DNS-Validation.