* Luigi Rosa <li...@luigirosa.com>:
> My goal is to use self-issued certificates to encrypt the communications
> between two Postfix MTAs and validate their identities
> 
> Per http://www.postfix.org/postconf.5.html#smtpd_tls_policy_maps if I use
> fingerprint in smtp_tls_policy_maps "there are no trusted certificate
> authorities. The certificate trust chain, expiration date, ... are not 
> checked"
> 
> So I generated the keys on both servers and configured them in both Postfix
> with smtpd_tls_key_file and smtpd_tls_cert_file
> 
> On the originating server I have:
> 
> smtp_tls_security_level = may
> smtp_tls_note_starttls_offer = yes
> smtp_tls_fingerprint_digest = sha1
> smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
> smtp_tls_loglevel = 1
> smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
> smtp_tls_session_cache_timeout = 3600s
> 
> tls policy is:
> 
> domain.com          fingerprint
>         match=09:e6:21:1b:92:86:67:f1:56:6b:a5:06:7f:00:7e:ab:c7:43:68:6d
> mail.domain.com          fingerprint
>         match=09:e6:21:1b:92:86:67:f1:56:6b:a5:06:7f:00:7e:ab:c7:43:68:6d
> 
> 
> On the receiving server I have
> 
> smtpd_tls_security_level = may
> smtpd_tls_key_file = /etc/ssl/mail.domain.com.key
> smtpd_tls_cert_file = /etc/ssl/mail.domain.com.crt
> smtpd_tls_received_header = yes
> smtpd_tls_loglevel = 1
> smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
> smtpd_tls_session_cache_timeout = 3600s
> tls_random_source = dev:/dev/urandom

You don't tell Postfix where to find the CA file that holds all CAs you trust.
Without a CA cert Postfix cannot verify a server cert.

p@rick

-- 
[*] sys4 AG
 
http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München
 
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein
 

Reply via email to