* Tolga <to...@ozses.net>:
> On Thu, Feb 05, 2009 at 04:25:50PM +0100, Patrick Ben Koetter wrote:
> > * Tolga <to...@ozses.net>:
> > > I am reading The Book of Postfix, I applied the steps CA.pl -newca, 
> > > openssl
> > > req -new -nodes -keyout privatekey.pem -out privatekey.pem -days 1825 and
> > > openssl ca -policy policy_anything -out publiccert.pem -infiles
> > > privatekey.pem , copied the key and cert under /etc/ssl/private and
> > > /etc/ssl/certs and restarted postfix, but I am obviously missing something
> > > and I can't use the new certificate. Can you help me?
> > 
> > Yes.
> > 
> > 1. Send output from "postconf -n".
> alias_database = hash:/etc/aliases
> alias_maps = hash:/etc/aliases
> append_dot_mydomain = no
> biff = no
> config_directory = /etc/postfix
> inet_interfaces = all
> mailbox_size_limit = 0
> mydestination = ozses.net, kunduz.org, localhost.net, localhost
> myhostname = ozses.net

Not a really good hostname unless you own ".net" and your host is "ozses".
Should probably be something like "mail.ozses.net"...


> mynetworks = 127.0.0.0/8 192.168.0.0/16 [::ffff:127.0.0.0]/104 [::1]/128
> myorigin = /etc/mailname

That's Debian/Ubuntu you are running, right? Does /etc/mailname contain
ozses.net? It should.


> readme_directory = no
> recipient_delimiter = +
> relayhost = 
> smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
> smtpd_banner = $myhostname ESMTP $mail_name (Ubuntu)
> smtpd_client_restrictions = permit_mynetworks,       
> permit_sasl_authenticated,       reject_unauth_destination,       
> reject_unknown_reverse_client_hostname,       reject_unauth_pipelining,       
> reject_non_fqdn_recipient,       
> reject_rbl_client zen.spamhaus.org
> smtpd_tls_CAfile = /usr/share/ssl-cert/ca-bundle.crt
> smtpd_tls_cert_file = /etc/ssl/certs/publiccert.pem
> smtpd_tls_key_file = /etc/ssl/private/privatekey.pem
> smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
> smtpd_use_tls = yes
> 
> > 2. Are the certficates readable by postfix?
> -rw-r--r-- 1 root root     1599 2009-02-05 16:33 privatekey.pem
> -rw-r--r-- 1 root root 3313 2009-02-05 16:34 /etc/ssl/certs/publiccert.pem
> 
> > 3. Does the server offer STARTTLS?
> 
> I think so, yes

Your configuration looks okay. Did you do the "openssl s_client ..." test from
the book? You should do it to test if your server offers STARTTLS and if
openssl's s_client is able to verify your server certificate.

Please show evidence of such a session.

p...@rick

-- 
The Book of Postfix
<http://www.postfix-book.com>
saslfinger (debugging SMTP AUTH):
<http://postfix.state-of-mind.de/patrick.koetter/saslfinger/>

Reply via email to