On Wed, Jun 10, 2015, at 06:53 PM, Viktor Dukhovni wrote: > > -o permit_tls_clientcerts=yes > > No such parameter.
Yes, caught that. It's correctly in -o smtpd_relay_restrictions=permit_tls_clientcerts,reject Not clear how I ended up with that. Gone now. > > -o relay_clientcerts=lmdb:/etc/postfix/smarthost_clientcerts > > Check the content with "postmap -q <fingerprint> lmdb:..." > > > -o smtpd_client_restrictions= > > -o smtpd_helo_restrictions= > > -o smtpd_sender_restrictions= > > -o smtpd_recipient_restrictions= > > -o smtpd_relay_restrictions=permit_tls_clientcerts,reject > > -o smtpd_data_restrictions= > > -o smtpd_end_of_data_restrictions= > > This looks like "permit_tls_clientcerts" did not match. It turns out the problem was a missing -o tls_append_default_CA=yes The smarthost end has a self-signed cert -- facing this connection -- that's addressed in my TLS key specs, but the submitter end uses an existing commercial cert. Without that setting, I believe it wasn't getting the at the standard CA certs. In any case, working now. > > -o amavisdfeed:[127.0.0.1]:40001 > > This is surely not a valid "-o" option. Did you "postfix reload" > after changing master.cf? That setting should trigger a fatal > error, and no messages coming in at all via the service in question. > Is the client connecting to this or some other service? I marvel at what a bad copy-n-paste can do to a simple communication. It's -o content_filter=amavisfeed:[127.0.0.1]:40001 which submits to an outbound amavisd policy bank for DKIM signing. Appears to work as intended. Once I figure get DKIM key rotation on the remote, with updates to a local DNS, working. I'll start figuring out DANE. After which I think I'm to a point to start testing it all as a working whole.