On Fri, Aug 04, 2017 at 12:31:53PM +0530, hyndavirap...@bel.co.in wrote:

> >> Can you help me to solve this problem
> >
> > Not without the requested logging, and copy of the server and CA
> > certificates.

> TLS logging is as below,

> Aug  4 11:52:29 AHQ postfix/smtp[11652]: 201.123.1.4[201.123.1.4]:25:
> certificate verification depth=1 verify=1

Your nexthop domain is "201.123.1.4" what is the verbatim entry in
the transport table that makes it so?

> Aug  4 11:52:29 AHQ postfix/smtp[11652]: 201.123.1.4[201.123.1.4]:25:
> subject_CN=1CorpHQ/emailaddress=1corphq_smtp_ad...@tcs.mil.in,

The subject CN is:

    subject_CN=1CorpHQ/emailaddress=1corphq_smtp_ad...@tcs.mil.in

not "1CorpHQ"!  That "/emailaddress" is, despite appearances to
the contrary, part of the subject CN and not a separate RDN component.

> issuer_CN=CA/emailAddress=ca_ad...@bel.co.in,

Ditto here, though that is not a problem.

> Aug  4 11:52:29 AHQ postfix/smtp[11652]: Trusted TLS connection
> established to 201.123.1.4[201.123.1.4]:25: TLSv1.2 with cipher
> ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

The certificate chain is valid, but the name does not match.

> tls_policy entry is given below
> 
> [201.123.1.4]:25      secure  match=1CorpHQ

Do make sure that the transport table entry is:

    1CorpHQ.tcs.mil.in smtp:[201.123.1.4]:25

and not some variant.  On the other hand, I would have gone with
just:

    transport:
        1CorpHQ.tcs.mil.in smtp:[201.123.1.4]

    tls_policy:
        [201.123.1.4]   secure  match=1CorpHQ

i.e. leave off the implicit ":25" in both.  Of course your real
problem is the "/emailaddress=..." in the subject CN.

You posted only the text form of the certificate, the evidence would
have been more conclusion with the actual PEM certificate included.

-- 
        Viktor.

Reply via email to