On Sat, Mar 19, 2011 at 03:37:11PM +0100, Raven wrote:

> > As for TLS, the security policy and certficate verification are tied to
> > the nexthop destination, not the recipient domain, if the two differ,
> > it is the nexthop destination that is used. This is documented, please
> > read the documentation carefully.
> > 
> 
> 
> I'm just wondering, how do I make postfix (client) trust the server's
> certificate? It's self generated, but I'd still like it to be trusted:

Postfix supports either X.509 PKI certificate verification:

    http://www.postfix.org/TLS_README.html#client_tls_secure

or direct certificate fingerprint verification for non-PKI static
self-signed certs:

    http://www.postfix.org/TLS_README.html#client_tls_fprint

> Mar 19 15:33:18 dellsrv3 postfix/smtp[29357]: Untrusted TLS connection
> established to relay.example.org[xxx.xxx.xxx.xxx]:587: TLSv1 with cipher
> ADH-AES256-SHA (256/256 bits)

This is harmless unless you want to thwart MITM attacks, in which case
either the server needs a cert from a trusted CA (chain), or you verify
its fingerprint directly.

-- 
        Viktor.

Reply via email to