On Wed, Jun 10, 2015 at 07:44:01PM -0700, PGNd wrote:

> > Check the content with "postmap -q <fingerprint> lmdb:..."
> > 
> > >     -o smtpd_client_restrictions=
> > >     -o smtpd_helo_restrictions=
> > >     -o smtpd_sender_restrictions=
> > >     -o smtpd_recipient_restrictions=
> > >     -o smtpd_relay_restrictions=permit_tls_clientcerts,reject
> > >     -o smtpd_data_restrictions=
> > >     -o smtpd_end_of_data_restrictions=
> > 
> > This looks like "permit_tls_clientcerts" did not match.
> 
> It turns out the problem was a missing
> 
>   -o tls_append_default_CA=yes

You should not need that.  You can safely replace "smtpd_tls_req_ccert"
with "smtpd_tls_ask_ccert".  Clients that don't present a certificate
will be denied access anyway.  Also IIRC your logging reported
"Trusted" client connections, so trust path verification was working
anyway.  Likely some other change made things work.

I would set that to "no" (safer) and avoid "req_ccert".

-- 
        Viktor.

Reply via email to