On Tue, Jun 9, 2015, at 06:25 PM, Viktor Dukhovni wrote:
> This sets the client's certificate chain file, not its list of trusted CAs. 

Misunderstood, now clear.

> But you're still not authenticating the server. For that you'll need: 
> smtp_tls_security_level=secure so that the client verifies the server 
> hostname also and 
> refuses to proceed when authentication fails.

>From my notes, I'd previously tried & failed with

        -o smtp_tls_security_level=secure

Reattempting

        CLIENT/master.cf
                ...
                relay-remote    unix    -    -    n    -    -    smtp
                  ...
                  -o smtp_tls_CAfile=/etc/ssl/mail/DDDD_CA.crt
                  -o smtp_tls_cert_file=/etc/ssl/mail/relay-remote.crt
                  -o smtp_tls_key_file=/etc/ssl/mail/relay-remote.key
+                 -o smtp_tls_policy_maps=lmdb:/etc/postfix/tls_policy
+                 -o smtp_tls_security_level=secure
                  -o tls_append_default_CA=no
                  ...
                ...

        CLIENT/tls_policy
                [internal.local010.DDDD.com]:11587    secure    match=nexthop

Returns a "Server certificate not verified" deferral

        Jun  9 18:43:24 remote016 postfix/relay-remote/smtp[24387]: Trusted TLS 
connection established to internal.local010.DDDD.com[10.128.1.10]:11587: 
TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
        Jun  9 18:43:24 remote016 postfix/relay-remote/smtp[24387]: DAA9666783: 
to=<t...@dddd.com>, relay=internal.local010.DDDD.com[10.128.1.10]:11587, 
delay=0.15, delays=0/0/0.15/0, dsn=4.7.5, status=deferred (Server certificate 
not verified)

Not clear to me what the problem actually is.  This is with

        -o smtp_tls_loglevel=2

I suspect the 'nexthop' strategy is getting an incorrect match name, but have 
yet to understand the general, correct usage after a couple of doc re-reads 
(http://www.postfix.org/postconf.5.html#smtp_tls_secure_cert_match)

Reply via email to