Zitat von Bernhard Schmidt <be...@birkenwald.de>:

Hi,

I'm having an issue I can't quite understand at the moment.

We are part of a larger PKI infrastructure run by the german NREN, which is in the end rooted at the Deutsche Telekom.

- Deutsche Telekom Root CA 2
  - DFN-Verein PCA Global - G01
    - LRZ-CA - G01   <-- this is ours
      - some client cert
    - LMU-CA         <-- this is ours
      - some client cert
    - TUM-CA         <-- this is ours
      - some client cert
    - more weirdos
  - other weirdos

We want to allow relaying for all certificates issued by our CAs. Which I thought to be pretty easy

smtpd_tls_CApath = /etc/postfix-postout/certs
smtpd_tls_received_header = yes
smtpd_tls_security_level = may
smtpd_tls_ask_ccert=yes

smtpd_recipient_restrictions = permit_tls_all_clientcerts, reject

lxmhs33:~ # ls -la /etc/postfix-postout/certs/
drwxr-xr-x 2 postmaster root 4096 20. Dez 08:46 .
drwxr-xr-x 4 postmaster root 4096 20. Dez 08:46 ..
lrwxrwxrwx 1 postmaster root   10 20. Dez 08:46 1ebd942d.0 -> TUM-CA.pem
lrwxrwxrwx 1 postmaster root   10 20. Dez 08:46 367d1e35.0 -> LRZ-CA.pem
lrwxrwxrwx 1 postmaster root   10 20. Dez 08:46 7ece279c.0 -> LMU-CA.pem
-rw-r--r-- 1 postmaster root 1826 24. Jul 2010  LMU-CA.pem
-rw-r--r-- 1 postmaster root 1850 24. Jul 2010  LRZ-CA.pem
-rw-r--r-- 1 postmaster root 1724 24. Jul 2010  TUM-CA.pem

Dec 20 08:59:59 lxmhs33 postfix-postout/smtpd[9870]: setting up TLS connection from postout.lrz.de[129.187.254.115] Dec 20 08:59:59 lxmhs33 postfix-postout/smtpd[9870]: CA certificate verification failed for postout.lrz.de[129.187.254.115]: num=2:unable to get issuer certificate Dec 20 08:59:59 lxmhs33 postfix-postout/smtpd[9870]: postout.lrz.de[129.187.254.115]: Untrusted: subject_CN=postout.lrz.de, issuer=LRZ-CA - G01, fingerprint=18:4B:79:22:82:67:DC:1E:60:35:41:F2:E4:A0:9F:1F Dec 20 08:59:59 lxmhs33 postfix-postout/smtpd[9870]: Untrusted TLS connection established from postout.lrz.de[129.187.254.115]: TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)

It only works when I put the full chain (including Deutsche Telekom and DFN) into the certs-directory, but then permit_tls_all_clientcerts would be stupid.

Dec 20 08:47:37 lxmhs33 postfix-postout/smtpd[9870]: connect from postout.lrz.de[129.187.254.115] Dec 20 08:47:37 lxmhs33 postfix-postout/smtpd[9870]: setting up TLS connection from postout.lrz.de[129.187.254.115] Dec 20 08:47:37 lxmhs33 postfix-postout/smtpd[9870]: postout.lrz.de[129.187.254.115]: Trusted: subject_CN=postout.lrz.de, issuer=LRZ-CA - G01, fingerprint=18:4B:79:22:82:67:DC:1E:60:35:41:
F2:E4:A0:9F:1F
Dec 20 08:47:37 lxmhs33 postfix-postout/smtpd[9870]: Trusted TLS connection established from postout.lrz.de[129.187.254.115]: TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)


This is SLES11.1 with postfix 2.8.7, openssl 0.9.8h.

Any idea how to allow all certificates issued by specific Sub-CAs, without trusting everyone?

As far as i understand you have to list the complete chain but only your sub-CA to get it working. So create a smtpd_tls_CAfile with the Telekom root and your sub-CA and nothing else. This would allow relaying for any certificate your sub-CA or the Telekom root CA has issued, but not for certificates issued by any sub-CA of the Telekom beside yours. Be aware that you should not do this on a public facing port 25.

Regards

Andreas


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to