On Mon, Sep 09, 2013 at 09:06:20AM +0200, Luigi Rosa wrote: > > Yes, but you do have to configure Postfix correctly. > > :) I managed to solve the problem, the key was smtp_tls_policy_maps, the main > error I made was to put the server name instead the mail domain name (the > recipient is on a different domain from the FQDN of the server). As you > pointed out setting loglevel to 2 helped a lot.
The lookup key for TLS policy is the nexthop domain, which is by default the envelope recipient domain, but can be preempted via transport(5) mappings, (including content_filter, default_transport, relay_transport, ...). > This leads to few more questions regarding smtp_tls_policy_maps: > > domain.com fingerprint > match=... > > in this case domain.com is the domain name of the recipient (the text after > '@' in the mail address) and not the FQDN of the MTA, correct? It is the transport nexthop. If "example.com" has a transport entry: example.com smtp:[smtp.example.net]:12345 then the lookup key is: [smtp.example.net]:12345 > If domain.com has a backup MX without TLS how can I tell the > smtp_tls_policy_maps not to use TLS with backup MX? You can't. (There is a non-scalable approach with master.cf and smtp_fallback_relay, but it is not worth the effort). There's not much point in verified TLS security when the backup MX is non-TLS. A man-in-the-middle attacker just drops connections to the primary, and the traffic is in the clear. Opportunistic TLS is sufficient when you can't secure all delivery paths. > > You have failed to mention any related transport(5) settings. The SMTP TLS > > policy table lookup key is the transport nexthop. > > I didn't set up anything in transport file, Postfix uses the DNS to deliver > the email. Should I put something in the transport file? No. Rather, not explaining your configuration in detail makes it difficult to help. -- Viktor.