On 2013-10-14 20:10, Viktor Dukhovni wrote:
On Mon, Oct 14, 2013 at 08:12:01AM -0400, Dan Langille wrote:

The master.cf has something like this:

64.147.113.42:5587 inet n       -       n       -       -       smtpd
-o smtp_tls_security_level=encrypt

The above setting is pointless, drop it.

Ahh. Yes. I think I understand. That is an stmp directive and this is an smtpd process. And the TLS security level for that is specified farther down as:

-o smtpd_tls_security_level=encrypt

I will move that to main.cf and change the value to may:

smtp_tls_security_level=may

-o smtpd_tls_CAfile=/usr/local/etc/ssl/ca-bundle.crt

An empty or nearly empty file is best here, all the CA DNs are sent
to the SMTP client, which does not need any of them.

I will try trimming those down to a minimum.

Some of the entries from main.cf are:

smtp_tls_policy_maps = hash:/usr/local/etc/postfix-config/tls_policy
transport_maps = hash:/usr/local/etc/postfix-config/transport
relay_clientcerts = hash:/usr/local/etc/postfix-config/relay_clientcerts
smtpd_tls_fingerprint_digest=sha1
smtp_tls_fingerprint_digest=sha1

Consider enabling TLS session caching.

I was thinking about that last night, after watching all the messages which are logged when smtpd_tls_loglevel=2. After adding TLS session caching, the logged messages closely resemble the messages you see with non-TLS comms (i.e. all the SSL_accept, Trusted TLS connection established, etc message disappear).

Thank you for the suggestions.  I appreciate it.

--
Dan Langille - http://langille.org/

Reply via email to