Hi all,

I've read what Postfix documentation I can find on the subject, and I
don't understand why I'm seeing untrusted connections rather than
trusted.  I'm using an account at mailbox.org for testing purposes, they
use DNSSEC / DANE for there server (as do I), and I see a verified
connection when sending email to their server, but returned connections
are untrusted.

This is what's logged when TLS logging is set to 2 -

Jan 31 17:53:31 indium postfix/smtpd[30307]: setting up TLS connection
from mx1.mailbox.org[80.241.60.212]
Jan 31 17:53:31 indium postfix/smtpd[30307]:
mx1.mailbox.org[80.241.60.212]: TLS cipher list
"aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH:!aNULL"
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS read
client hello
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
server hello
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
certificate
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
key exchange
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
certificate request
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
server done
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
server done
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS read
client certificate
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS read
client key exchange
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS read
certificate verify
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS read
change cipher spec
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS read
finished
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
session ticket
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
change cipher spec
Jan 31 17:53:31 indium postfix/smtpd[30307]: SSL_accept:SSLv3/TLS write
finished
Jan 31 17:53:31 indium postfix/smtpd[30307]: Untrusted TLS connection
established from mx1.mailbox.org[80.241.60.212]: TLSv1.2 with cipher
ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

This is the relevant part of main.cf -

smtpd_use_tls = yes
smtpd_tls_key_file  = /etc/pki/tls/private/mail.trisect.uk.key
smtpd_tls_cert_file = /etc/pki/tls/certs/mail.trisect.uk.crt
smtpd_tls_CApath = /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
smtpd_tls_ask_ccert = yes
smtpd_tls_ccert_verifydepth = 2
smtpd_tls_security_level = may
smtpd_tls_loglevel = 1
smtpd_tls_auth_only = no
smtpd_tls_received_header = yes
smtpd_tls_session_cache_timeout = 3600s

As far as I can tell the CA certificate used by mailbox.org is included
in ca-bundle.trust.crt

What have I missed (if anything)?

Thanks for looking

Reply via email to