> On Nov 14, 2016, at 9:08 PM, Steve Jenkins <st...@stevejenkins.com> wrote:
> 
> # postconf -n | grep tls
> smtp_tls_CAfile = $smtpd_tls_CAfile
> smtp_tls_loglevel = 1
> smtp_tls_security_level = may

The above, being outgoing (SMTP client) settings have no bearing
on the TLS behaviour of your server when receiving mail.

> smtpd_tls_CAfile = /etc/postfix/ssl/cacert.pem

This is unlikely to be useful in constructing a complete
chain for Let's Encrypt if it is certs for cacert.org.

> smtpd_tls_auth_only = yes
> smtpd_tls_cert_file = /etc/pki/tls/certs/example.com.crt
> smtpd_tls_key_file = /etc/pki/tls/private/example.com.key

You *really* should not use "example" certs/keys.

> It breaks (on iOS) if I change the smtpd_tls_cert_file and smtpd_tls_key_file 
> to the Let's Encrypt cert and key.

If iOS is happy with random "example" certs, perhaps it is
because it was explicitly configured to trust these.

In any case the right thing to do is in fact to populate the
cert file with your server's Let's Encrypt certificate and
issuing CA certificate in that order.  The key file must have
the corresponding private key.

-- 
        Viktor.

Reply via email to