On Wed, Aug 25, 2010 at 05:59:10AM -0700, Security Admin (NetSec) wrote:

> "postfix/smtp[28338]: certificate verification failed
> for mail.xxxxx.org[xxx.xxx.xxx.xxx]:25: untrusted issuer
> /C=US/O=Entrust.net/OU=www.entrust.net/CPS incorp. by ref. (limits
> liab.)/OU=(c) 1999 Entrust.net Limited/CN=Entrust.net Secure Server
> Certification Authority"

This public root CA is not listed in your smtp_tls_CAfile or smtp_tls_CApath.

> Mail is still sent despite warning.  Suspect that problem is either:

Opportunistic TLS works as advertised.

> 1.        Using a self-signed certificate and need to purchase one to use 
> with mail server.  If this is the case, would appreciate 
> recommendations/weblinks on good places to purchase.

Irrelevant. The certificate in question is on a remote server, not yours.

> 2.       Configuration error.  Partial main.cf is below:
> 
> smtpd_use_tls = yes
> smtp_use_tls = yes

Obsolete, use "smtp_tls_security_level" and "smtpd_tls_security_level".

> smtp_tls_security_level = may

Good, you don't need the obsolete "smtp_use_tls" setting.

> smtp_tls_CAfile = /etc/postfix/exchange.pem

You can list more CAs in this file if you wish.

> smtp_tls_policy_maps = hash:/etc/postfix/tls_policy

Fine.

> smtpd_tls_mandatory_ciphers = high

This is unlikely to have any effect, unless you have a submission service
defined in master.cf.

> smtpd_tls_loglevel = 2

Too verbose for production use.

> smtpd_tls_session_cache_database = sdbm:/etc/postfix/smtpd_scache
> smtpd_tls_session_cache_database = btree:/var/lib/postfix/smtpd_scache

Clearly, only one of these is used, specifically the last. Drop the needless
sdbm setting.

-- 
        Viktor.

Reply via email to