On Tue, Jun 09, 2015 at 07:06:26PM -0700, PGNd wrote:

> Reattempting
> 
>       CLIENT/master.cf
>               ...
>               relay-remote    unix    -    -    n    -    -    smtp
>                 ...
>                 -o smtp_tls_CAfile=/etc/ssl/mail/DDDD_CA.crt
>                 -o smtp_tls_cert_file=/etc/ssl/mail/relay-remote.crt
>                 -o smtp_tls_key_file=/etc/ssl/mail/relay-remote.key
> +               -o smtp_tls_policy_maps=lmdb:/etc/postfix/tls_policy
> +               -o smtp_tls_security_level=secure
>                 -o tls_append_default_CA=no
>                 ...
>               ...
> 
>       CLIENT/tls_policy
>               [internal.local010.DDDD.com]:11587    secure    match=nexthop
> 
> Returns a "Server certificate not verified" deferral

The server certificate name probably does not match the nexthop
domain.

> 
>       Jun  9 18:43:24 remote016 postfix/relay-remote/smtp[24387]: Trusted TLS 
> connection established to internal.local010.DDDD.com[10.128.1.10]:11587: 
> TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

> Not clear to me what the problem actually is.  This is with
> 
>       -o smtp_tls_loglevel=2
> 
> I suspect the 'nexthop' strategy is getting an incorrect match name, but have 
> yet to understand the general, correct usage after a couple of doc re-reads 
> (http://www.postfix.org/postconf.5.html#smtp_tls_secure_cert_match)

Yes, the key question is what's in the server certificate.  You'll
want "match=<whatever appears there>".  And if you're using the
policy table, you don't also need  "smtp_tls_security_level=secure",
the policy table preempts that.

-- 
        Viktor.

Reply via email to