Viktor Dukhovni wrote the following on 05/02/14 20:44:
On Wed, Feb 05, 2014 at 08:28:51PM +0000, Alan Munday wrote:

Viktor Dukhovni wrote the following on 05/02/14 18:45:
On Wed, Feb 05, 2014 at 05:07:27PM +0000, Alan Munday wrote:

Feb  5 16:01:21 mx1 postfix/smtpd[22789]:
   Anonymous TLS connection established
   from mail-db3lp0084.outbound.protection.outlook.com[213.199.154.84]:
   TLSv1 with cipher AES128-SHA (128/128 bits)
Feb  5 16:01:21 mx1 postfix/smtpd[22789]:
   lost connection after EHLO
   from mail-db3lp0084.outbound.protection.outlook.com[213.199.154.84]

Your certificate chain on mx1 is somewhat unusual, the issuer CA
certificate has "CA:FALSE" in basic constraints:

And re-creating the certificates with CA:TRUE in the [ usr_cert ]
section of openssl.cnf appears to resolve the problem.

Now for the record your leaf certificate is also a CA, which is
harmless I imagine, but keep that in mind if you run into problems
with some other nitpicky implementation.

You're probably better off with just a self-signed cert with CA:FALSE
and no issuer CA.  (Basically your original issuer CA was a perfectly
good leaf server certificate).

I'm looking at this now... and this is just my ignorance with TLS and having done the original configuration many years ago.

In main.cf I have:

smtpd_tls_key_file = /etc/postfix/server.key.pem
smtpd_tls_cert_file = /etc/postfix/server.cert.pem
smtpd_tls_CAfile = /etc/postfix/CAcert.pem

And when I verify with openssl reports OK.

[root@mx1 postfix]# openssl verify -CAfile /etc/postfix/CAcert.pem /etc/postfix/server.cert.pem
/etc/postfix/server.cert.pem: OK

server.cert.pem is actually a link to /etc/postfix/mx1 but that also verifies OK.

[root@mx1 postfix]# openssl verify -CAfile /etc/postfix/CAcert.pem /etc/postfix/mx1.cert.pem
/etc/postfix/mx1.cert.pem: OK


Rather than tie up peoples time is there a reference I can go to and I'll work through things from scratch.

Thanks

Alan




Reply via email to