On Wed, Aug 25, 2010 at 05:59:10AM -0700, Security Admin (NetSec) wrote: > "postfix/smtp[28338]: certificate verification failed > for mail.xxxxx.org[xxx.xxx.xxx.xxx]:25: untrusted issuer > /C=US/O=Entrust.net/OU=www.entrust.net/CPS incorp. by ref. (limits > liab.)/OU=(c) 1999 Entrust.net Limited/CN=Entrust.net Secure Server > Certification Authority"
This public root CA is not listed in your smtp_tls_CAfile or smtp_tls_CApath. > Mail is still sent despite warning. Suspect that problem is either: Opportunistic TLS works as advertised. > 1. Using a self-signed certificate and need to purchase one to use > with mail server. If this is the case, would appreciate > recommendations/weblinks on good places to purchase. Irrelevant. The certificate in question is on a remote server, not yours. > 2. Configuration error. Partial main.cf is below: > > smtpd_use_tls = yes > smtp_use_tls = yes Obsolete, use "smtp_tls_security_level" and "smtpd_tls_security_level". > smtp_tls_security_level = may Good, you don't need the obsolete "smtp_use_tls" setting. > smtp_tls_CAfile = /etc/postfix/exchange.pem You can list more CAs in this file if you wish. > smtp_tls_policy_maps = hash:/etc/postfix/tls_policy Fine. > smtpd_tls_mandatory_ciphers = high This is unlikely to have any effect, unless you have a submission service defined in master.cf. > smtpd_tls_loglevel = 2 Too verbose for production use. > smtpd_tls_session_cache_database = sdbm:/etc/postfix/smtpd_scache > smtpd_tls_session_cache_database = btree:/var/lib/postfix/smtpd_scache Clearly, only one of these is used, specifically the last. Drop the needless sdbm setting. -- Viktor.