On Wed, Feb 25, 2009 at 08:03:24PM +0100, Manuel P??gouri??-Gonnard wrote:

> Hmm, isn't it twice the same paragrah (or two versions of it)?
> 
> May I suggest to update the description of smtpd_tls_CA_file
>
> By the way, I'm not sure still whether I understand correctly smptd_CA_path.
> Would the following description be adequate?

How about this version?

Index: proto/TLS_README.html
*** proto/TLS_README.html       25 Feb 2009 04:38:56 -0000      1.1.1.4.42.1
--- proto/TLS_README.html       25 Feb 2009 17:33:17 -0000
***************
*** 266,276 ****
  clients without special cipher choices, the RSA certificate is
  preferred. </p>
  
! <p> In order for remote SMTP clients to check the Postfix SMTP
! server certificates, the CA certificate (in case of a certificate
! chain, all CA certificates) must be available.  You should add any
! intermediate CA certificates to the server certificate: the server
! certificate first, then the intermediate CA(s).  </p>
  
  <p> Example: the certificate for "server.example.com" was issued by
  "intermediate CA" which itself has a certificate issued by "root
--- 266,276 ----
  clients without special cipher choices, the RSA certificate is
  preferred. </p>
  
! <p> To enable a remote SMTP client to verify the Postfix SMTP server
! certificate, the issuing CA certificates must be made available to the
! client. You should include the required certificates in the server
! certificate file, the server certificate first, then the issuing
! CA(s) (bottom-up order). </p>
  
  <p> Example: the certificate for "server.example.com" was issued by
  "intermediate CA" which itself has a certificate issued by "root
***************
*** 1001,1014 ****
  password. Both parts (certificate and private key) may be in the
  same file. </p>
  
! <p> In order for remote SMTP servers to verify the Postfix SMTP
! client certificates, the CA certificate (in case of a certificate
! chain, all CA certificates) must be available.  You should add
! these certificates to the client certificate, the client certificate
! first, then the issuing CA(s). </p>
  
  <p> Example: the certificate for "client.example.com" was issued by
! "intermediate CA" which itself has a certificate of "root CA".
  Create the client.pem file with: </p>
  
  <blockquote>
--- 1001,1014 ----
  password. Both parts (certificate and private key) may be in the
  same file. </p>
  
! <p> To enable remote SMTP servers to verify the Postfix SMTP client
! certificate, the issuing CA certificates must be made available to the
! server. You should include the required certificates in the client
! certificate file, the client certificate first, then the issuing
! CA(s) (bottom-up order). </p>
  
  <p> Example: the certificate for "client.example.com" was issued by
! "intermediate CA" which itself has a certificate issued by "root CA".
  Create the client.pem file with: </p>
  
  <blockquote>
Index: proto/postconf.proto
*** proto/postconf.proto        25 Feb 2009 04:38:56 -0000      1.1.1.22.16.1
--- proto/postconf.proto        26 Feb 2009 14:42:42 -0000
***************
*** 890,896 ****
  
  <pre>
  debug_peer_list = 127.0.0.1
! debug_peer_list = some.domain
  </pre>
  
  %PARAM default_database_type see "postconf -d" output
--- 890,896 ----
  
  <pre>
  debug_peer_list = 127.0.0.1
! debug_peer_list = example.com
  </pre>
  
  %PARAM default_database_type see "postconf -d" output
***************
*** 2876,2882 ****
  </p>
  
  <pre>
! myhostname = host.domain.tld
  </pre>
  
  %PARAM mynetworks see "postconf -d" output
--- 2876,2882 ----
  </p>
  
  <pre>
! myhostname = host.example.com
  </pre>
  
  %PARAM mynetworks see "postconf -d" output
***************
*** 3508,3514 ****
  
  <pre>
  relayhost = $mydomain
! relayhost = [gateway.my.domain]
  relayhost = uucphost
  relayhost = [an.ip.add.ress]
  </pre>
--- 3508,3514 ----
  
  <pre>
  relayhost = $mydomain
! relayhost = [gateway.example.com]
  relayhost = uucphost
  relayhost = [an.ip.add.ress]
  </pre>
***************
*** 8430,8441 ****
  presented to the client.  For Netscape and OpenSSL clients without
  special cipher choices the RSA certificate is preferred. </p>
  
! <p> In order to verify a certificate, the CA certificate (in case
! of a certificate chain, all CA certificates) must be available.
! You should add these certificates to the server certificate, the
! server certificate first, then the issuing CA(s).  </p>
  
! <p> Example: the certificate for "server.dom.ain" was issued by
  "intermediate CA" which itself has a certificate of "root CA".
  Create the server.pem file with "cat server_cert.pem intermediate_CA.pem
  root_CA.pem &gt; server.pem". </p>
--- 8430,8442 ----
  presented to the client.  For Netscape and OpenSSL clients without
  special cipher choices the RSA certificate is preferred. </p>
  
! <p> To enable a remote SMTP client to verify the Postfix SMTP server
! certificate, the issuing CA certificates must be made available to the
! client. You should include the required certificates in the server
! certificate file, the server certificate first, then the issuing
! CA(s) (bottom-up order). </p>
  
! <p> Example: the certificate for "server.example.com" was issued by
  "intermediate CA" which itself has a certificate of "root CA".
  Create the server.pem file with "cat server_cert.pem intermediate_CA.pem
  root_CA.pem &gt; server.pem". </p>
***************
*** 8498,8509 ****
  
  %PARAM smtpd_tls_CAfile
  
! <p> The file with the certificate of the certification authority
! (CA) that issued the Postfix SMTP server certificate.  This is
! needed only when the CA certificate is not already present in the
! server certificate file.  This file may also contain the CA
! certificates of other trusted CAs.  You must use this file for the
! list of trusted CAs if you want to use chroot-mode. </p>
  
  <p> Example: </p>
  
--- 8499,8523 ----
  
  %PARAM smtpd_tls_CAfile
  
! <p> A file containing (PEM format) CA certificates of root CAs trusted
! to sign either remote SMTP client certificates or intermediate CA
! certificates.  These are loaded into memory before the smtpd(8) server
! enters the chroot jail. If the number of trusted roots is large, consider
! using smtpd_tls_CApath instead, but note that the latter directory must
! be present in the chroot jail if the smtpd(8) server is chrooted. This
! file may also be used to augment the server certificate trust chain,
! but it is best to include all the required certificates directly in the
! server certificate file. </p>
! 
! <p> By default (see smtpd_tls_ask_ccert), client certificates are not
! requested, and smtpd_tls_CAfile should remain empty. If you do make use
! of client certificates, the distinguished names (DNs) of the certificate
! authorities listed in smtpd_tls_CAfile are sent to the remote SMTP client
! in the client certificate request message. MUAs with multiple client
! certificates may use the list of preferred certificate authorities
! to select the correct client certificate.  You may want to put your
! "preferred" CA or CAs in this file, and install other trusted CAs in
! $smtpd_tls_CApath. </p>
  
  <p> Example: </p>
  
***************
*** 8515,8531 ****
  
  %PARAM smtpd_tls_CApath
  
! <p> Directory with PEM format certificate authority certificates
! that the Postfix SMTP server offers to remote SMTP clients for the
! purpose of client certificate verification.  Do not forget to create
! the necessary "hash" links with, for example, "$OPENSSL_HOME/bin/c_rehash
! /etc/postfix/certs".  </p>
! 
! <p> To use this option in chroot mode, this directory (or a copy)
! must be inside the chroot jail. Please note that in this case the
! CA certificates are not offered to the client, so that e.g.  Netscape
! clients might not offer certificates issued by them.  Use of this
! feature is therefore not recommended. </p>
  
  <p> Example: </p>
  
--- 8529,8550 ----
  
  %PARAM smtpd_tls_CApath
  
! <p> A directory containing (PEM format) CA certificates of root CAs
! trusted to sign either remote SMTP client certificates or intermediate CA
! certificates. Do not forget to create the necessary "hash" links with,
! for example, "$OPENSSL_HOME/bin/c_rehash /etc/postfix/certs". To use
! smtpd_tls_CApath in chroot mode, this directory (or a copy) must be
! inside the chroot jail. </p>
! 
! <p> By default (see smtpd_tls_ask_ccert), client certificates are
! not requested, and smtpd_tls_CApath should remain empty. In contrast
! to smtp_tls_CAfile, DNs of certificate authorities installed
! in $smtpd_tls_CApath are not included in the client certificate
! request message. MUAs with multiple client certificates may use the
! list of preferred certificate authorities to select the correct
! client certificate.  You may want to put your "preferred" CA or
! CAs in $smtp_tls_CAfile, and install the remaining trusted CAs in
! $smtpd_tls_CApath. </p>
  
  <p> Example: </p>
  
***************
*** 8872,8884 ****
  <p> The best way to use the default settings is to comment out the above
  parameters in main.cf if present. </p>
  
! <p> In order to verify certificates, the CA certificate (in case
! of a certificate chain, all CA certificates) must be available.
! You should add these certificates to the client certificate, the
! client certificate first, then the issuing CA(s). </p>
  
! <p> Example: the certificate for "client.dom.ain" was issued by
! "intermediate CA" which itself has a certificate of "root CA".
  Create the client.pem file with "cat client_cert.pem intermediate_CA.pem
  root_CA.pem &gt; client.pem". </p>
  
--- 8891,8904 ----
  <p> The best way to use the default settings is to comment out the above
  parameters in main.cf if present. </p>
  
! <p> To enable remote SMTP servers to verify the Postfix SMTP client
! certificate, the issuing CA certificates must be made available to the
! server. You should include the required certificates in the client
! certificate file, the client certificate first, then the issuing
! CA(s) (bottom-up order). </p>
  
! <p> Example: the certificate for "client.example.com" was issued by
! "intermediate CA" which itself has a certificate issued by "root CA".
  Create the client.pem file with "cat client_cert.pem intermediate_CA.pem
  root_CA.pem &gt; client.pem". </p>
  
***************
*** 8919,8928 ****
  
  %PARAM smtp_tls_CAfile
  
! <p> The file with the certificate of the certification authority
! (CA) that issued the Postfix SMTP client certificate.  This is
! needed only when the CA certificate is not already present in the
! client certificate file.  </p>
  
  <p> Example: </p>
  
--- 8939,8953 ----
  
  %PARAM smtp_tls_CAfile
  
! <p> A file containing CA certificates of root CAs trusted to sign
! either remote SMTP server certificates or intermediate CA certificates.
! These are loaded into memory before the smtp(8) client enters the
! chroot jail. If the number of trusted roots is large, consider using
! smtp_tls_CApath instead, but note that the latter directory must be
! present in the chroot jail if the smtp(8) client is chrooted. This
! file may also be used to augment the client certificate trust chain,
! but it is best to include all the required certificates directly in
! $smtp_tls_cert_file. </p>
  
  <p> Example: </p>
  


-- 
        Viktor.

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the "Reply-To" header.

To unsubscribe from the postfix-users list, visit
http://www.postfix.org/lists.html or click the link below:
<mailto:majord...@postfix.org?body=unsubscribe%20postfix-users>

If my response solves your problem, the best way to thank me is to not
send an "it worked, thanks" follow-up. If you must respond, please put
"It worked, thanks" in the "Subject" so I can delete these quickly.

Reply via email to