Thanks for the response Victor...

On 4/18/2014 2:20 PM, Viktor Dukhovni <postfix-us...@dukhovni.org> wrote:
On Fri, Apr 18, 2014 at 02:06:20PM -0400, Charles Marcus wrote:

Ok, been wanting to do this for a while, and I after the Heartbleed fiasco,
the boss finally agreed to let me buy some real certs...

Until now, we've been using self-signed certs with the following postfix
settings:

smtpd_tls_cert_file = /etc/ssl/ourCerts/smtp_crt.pem
smtpd_tls_key_file = /etc/ssl/ourCerts/smtp_key.pem

You seem to know how to specify a private-key / public-key-certificate
chain pair...

Well... I did this a looong time ago, and probably stumbled badly...

I would say I am capable of following detailed instructions *usually* without making a mistake, but I also don't really understand this stuff...

I don't even know the difference between a .pem and .crt, and definitaly don't have a clue when iti comes to chainming certs or anything.

I'm trying to follow the instructions from RapidSSL, but they only specifically document installs for web servers, and I did find an old knowledgebase article about installing them for dovecot...

Here are their instructions in the email I got with my cert (obviously NOT included):

1. INSTALL CERTIFICATE:
Install the X.509 version of your certificate included at the end of this 
e-mail.
For installation instructions for your SSL Certificate, go to:
https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&id=SO16226

2. INTERMEDIATE CERTIFICATE ADVISORY:
You MUST install the RapidSSL intermediate Certificate on your server together 
with your Certificate or it may not operate correctly.

** MICROSOFT IIS and TOMCAT USERS
Microsoft and Tomcat users are advised to download a PKCS #7 formatted 
certificate from the GeoTrust User Portal:
https://products.geotrust.com/orders/orderinformation/authentication.do. PKCS 
#7 is the default format used by these vendors during installation and includes 
the intermediate CA certificate.

You can get your RapidSSL Intermediate Certificates at:
https://knowledge.rapidssl.com/support/ssl-certificate-support/index?page=content&id=AR1548

I've downloaded the 'Intermediate Bundle' at the above link, and that is what I 
named RapidSSL_Intermediate.crt and referenced for the smtpd_tls_CAfile.

Now, I've created new keys/certs and the CSR, got the new certs from
RapidSSL (and also downloaded their Intermediate bundle), but can't find any
docs for installing with postfix.
     http://www.postfix.org/TLS_README.html#server_cert_key

Thanks, but, honestly, that is all over my head...

I did find some random stuff on the internet (ugh), which is why I'm asking
for confirmation here...

smtpd_tls_cert_file = /etc/ssl/ourNewCerts/smtp.ourdomain.com.crt
smtpd_tls_key_file = /etc/ssl/ourNewCerts/smtp.ourdomain.com.key
smtpd_tls_CAfile = /etc/ssl/ourNewCerts/RapidSSL_Intermediate.crt

No.  The correct approach is at:

     http://www.postfix.org/TLS_README.html#server_cert_key

     With legacy public CA trust verification, you can omit the root
     certificate from the "server.pem" certificate file. If the
     client trusts the root CA, it will already have a local copy
     of the root CA certificate. Omitting the root CA certificate
     reduces the size of the server TLS handshake.

        % cat server_cert.pem intermediate_CA.pem > server.pem

linked from:

     http://www.postfix.org/TLS_README.html#server_tls

linked from the top set of topic links in:

     http://www.postfix.org/TLS_README.html

Thanks again, Victor, but again, that is all over my head.

--

Best regards,

Charles

Reply via email to