(Viktor, I'm going to reply to Wietse first, just because his questions
are fewer and I am hoping to clarify the points of confusion before
others reply.)

On 7/15/2013 1:24 PM, Wietse Venema wrote:
> Ben Johnson:
>> Hello,
>>
>> We host mail services for a few dozen domains. We will eventually
>> require TLS for all client connections.
>>
>> I have reviewed what seems to be the most comprehensive thread on this
>> subject (
>> http://postfix.1071664.n5.nabble.com/TLS-SNI-support-td25552.html ) and,
>> in light of that information, am trying to determine the best course of
>> action.
>>
>> In essence, our clients wish to use their own SSL certificates for their
>> SMTP connections. Given that there are no plans to implement SNI in
>> Postfix (it seems not to be sufficiently useful to justify the work
>> involved, which I understand), I am left wondering what the alternative
>> might be.
>>
>> Our clients will not accept the position, "You just have to ignore the
>> 'domain mistmatch' warning and accept the certificate permanently when
>> you connect to the mail server." And I don't blame them.
> 
> You are creating massive confusion because you fail to explain
> 
> a) whether you're talking about MUA service or MTA service, and
> 

The "domain mismatch" occurs in the MUA (e.g., Thunderbird, Apple Mail,
etc.).

> b) what name is "mismatching" with your SMTP server name, and
> 

Some of our clients insist that they access the the MTA that handles
their mail, which resides on one of our servers, via their own domain
names. So, these clients are using smtp.client.com instead of
smtp.provider.com. Whether or not this is a "necessary" or "a good idea"
is, unfortunately, largely irrelevant. I have tried to convince clients
that they should be connecting to the submission service via *our*
domain name, and not their own domain name, but have faced nothing but
resistance.

> c) why the customer is using that name.
> 

Because the customer wants to "control" his own SSL certificate,
including its renewal, re-issuance, and revocation. This does not seem
like an entirely unreasonable request, to be fair. (I do realize that
this is a "false sense of security", given that the client must relay
all certificate changes through us, since we control the MTA.)

>       Wietse
> 

I really appreciate your time, Wietse. Thanks for the reply. Let me know
if anything else is unclear.

-Ben

Reply via email to