Victor Duchovni a écrit :
> --- 8873,8892 ----
>   <p> The best way to use the default settings is to comment out the above
>   parameters in main.cf if present. </p>
>   
> ! <p> In order for remote SMTP servers to verify the Postfix SMTP client
> ! certificate, the issuing CA certificate must be made available to the
> ! server. You should include the required certificates in the client
> ! certificate file, the client certificate first, then the issuing
> ! CA(s). </p>
> ! 
> ! <p> To enable remote SMTP servers to verify the Postfix SMTP client
> ! certificate, the issuing CA certificates must be made available to the
> ! server. You should include the required certificates in the client
> ! certificate file, the client certificate first, then the issuing
> ! CA(s) (bottom-up order). </p>
> 
Hmm, isn't it twice the same paragrah (or two versions of it)?

> --- 8927,8940 ----
>   
>   %PARAM smtp_tls_CAfile
>   
> ! <p> A file containing CA certificates of root CAs trusted to sign
> ! either remote SMTP server certificates or intermediate CA certificates.
> ! These are loaded into memory before the smtp(8) client enters the chroot
> ! jail. If the number of trusted roots is large, consider using 
> smtp_tls_CApath
> ! instead, but note that the latter directory be present in the chroot jail
> ! if the smtp(8) client is chrooted. The file may also be used to augment
> ! the client certificate trust chain, but is best to included all the
> ! required certificates directly in the client certificate file. </p>
>   
>   <p> Example: </p>
>   
(Small typo : "it is best to include".)

May I suggest to update the description of smtpd_tls_CA_file
accordingly, so that the reader is not confused by unsignificant
differences and can concentrate on the main point (or in other words, to
better show the symmetry)? Eg:

-------
  %PARAM smtp_tls_CAfile

! <p> A file containing CA certificates of root CAs trusted to sign
! either remote SMTP client certificates or intermediate CA certificates.
! These are loaded into memory before the smtpd(8) client enters the chroot
! jail. If the number of trusted roots is large, consider using smtpd_tls_CApath
! instead, but note that the latter directory be present in the chroot jail
! if the smtpd(8) server is chrooted. The file may also be used to augment
! the server certificate trust chain, but is best to include all the
! required certificates directly in the client certificate file. </p>

  <p> Example: </p>
-------

By the way, I'm not sure still whether I understand correctly smptd_CA_path.
Would the following description be adequate?

------
  %PARAM smtpd_tls_CApath

! <p> Directory  with  PEM format certificate authority certificates that the
! Postfix SMTP client uses to verify a remote  SMTP  server  certificate.
! Don’t forget to create the necessary "hash" links with, for example,
! "$OPENSSL_HOME/bin/c_rehash /etc/postfix/certs". </p>
!
! <p> To use this option in chroot mode, this directory (or a copy)  must  be
! inside the chroot jail. </p>
!
! <p> Please note that the CA certificates in this directory are not offered to
 ! the client. In order to augment the server certificate trust chain, you can
! use the smtpd_tls_CApath, but is best to include all the required certificates
! directly in the client certificate file. </p>

  <p> Example: </p>
-------

(The "in this case" in the current version looks very confusing to me: I always
wonder whether it is opposing the chrooted case to the not-chrooted, or
smtpd_tls_CApath to smptd_tls_CAfile. Hope I got it right. By the way, if the
latter paragraph is correct, it may be worth appending its symmetric (reversing
client/server) to the description of smtp_tls_CApath, for the sake of.. well,
symmetry.)

Thanks,
Manuel.

Reply via email to