-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,
I have a TLS enabled Postfix with a PKI certificate.

The configuration of SMTP TLS is:

smtp_tls_security_level = may
smtp_tls_note_starttls_offer = yes
smtp_tls_fingerprint_digest = sha1
smtp_tls_policy_maps = hash:/etc/postfix/tls_policy

and in tls_policy I put some recipient domains I know with "fingerprint" and
the fingerprint(s) of their keys.

But many PKI keys last 365 days, so sooner or later the fingerprints are no
longer valid and the mail will not be delivered to that domains until I change
the policy or I put a new fingerprint.

My question is: with PKI keys is better to leave the opportunistic TLS policy
and use fingerprint only for self issued keys with 3650 days of validity or
are there some better ways to handle this?

Thank you in advance.



Ciao,
luigi

- -- 
/
+--[Luigi Rosa]--
\

I have always imagined that paradise will be a kind of library.
    --Jorge Luis Borges
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlI8MzwACgkQ3kWu7Tfl6ZTs9ACdERs11iAybH22fRTs+AmDU3QQ
CBUAniWJce7Z0kb2sb2Nt69Z8BCFLnZh
=PrkZ
-----END PGP SIGNATURE-----

Reply via email to