Viktor Dukhovni: > On Thu, May 17, 2012 at 12:50:16AM +0200, Patrick Ben Koetter wrote: > > > > maillog: http://pastebin.com/k1EzFFY9 > > > postconf: http://pastebin.com/AjMGykjV > > > > You tell Postfix to keep the session cache databases in the queue_directory, > > but that is owned by root (on my systems): > > > > smtp_tls_session_cache_database = btree:${queue_directory}/smtp_scache > > smtpd_tls_session_cache_database = btree:${queue_directory}/smtpd_scache > > > > Use $data_directory instead. > > That's likely not the direct cause of the problem, rather the > existing cache likely contains entries from different OpenSSL > version, and OpenSSL segfaults when one imports a cached session > from an older (different) OpenSSL library. > > The cache lookup keys are by transport+destination, so sending mail > to an address in the cache, causes an incompatible session to be > loaded even if it is from a different library version. So we should > probably add the library version to the lookup key.
Something along this line should do the job: #define GEN_CACHE_ID(buf, id, len, service) \ do { \ buf = vstring_alloc(2 * (len) + 1 + strlen(service) + 3); \ hex_encode(buf, (char *) (id), (len)); \ vstring_sprintf_append(buf, "&s=%s", (service)); \ + vstring_sprintf_append(buf, "&l=%ld", (long) OPENSSL_VERSION_NUMBER); \ } while (0) This macro transforms the shared SSL/TLS session ID into a local Postfix cache lookup key. If the OpenSSL library version changes, then the Postfix lookup key will not match sessions that were stored while Postfix was linked with a different OpenSSL library version. Security analysis: the Postfix cache lookup key is never shared with remote peers, so it is safe to include the local OpenSSL library version number. Wietse