On Sun, Oct 06, 2013 at 08:52:06PM -0400, Dan Langille wrote:

[ What Noel said, plus see below. ]

> 10.0.0.1:submission inet n       -       n       -       -       smtpd
>   -o smtpd_tls_req_ccert=yes

Fine.

>   -o smtpd_tls_auth_only=no

This seems silly.  Since authentication gets them nowhere, why
allow plaintext password leaks?  Just disable SASL period.

>   -o smtpd_tls_ask_ccert=yes

This is implied by req_ccert.

>   -o smtp_tls_CAfile=/usr/local/etc/ssl/ca-bundle.crt

This is an SMTP client parameter that serves no purpose here.

>   -o smtpd_tls_CAfile=/usr/local/etc/ssl/ca-bundle.crt

This is a bad idea.  Instead set this to an empty file.  The list
of all the CA DNs from this file is sent to the client, but your
clients probably don't need CA hints.  Otherwise make this is a
small list of one or two suitable CAs that issue the certificates
which are admitted via the relay certs file.  You should your digest
algorithm explicitly (sha1 or better if available as with OpenSSL
1.0.0 or later or the most recent Postfix patches that make sha256
available with older OpenSSL releases).

> # cat /usr/local/etc/postfix-config/main/relay_clientcerts
> 3A:2E:AB:6A:F1:D4:32:74:C9:C6:DD:2B:8D:2A:87:97 cliff.example.org

This looks like md5, and while still largely resistant to 2nd
preimage attacks, you should still avoid it.

-- 
        Viktor.

Reply via email to