On 03.07.2019 17:24, David Gibbs wrote:
> On 7/2/19 3:03 PM, David Mehler wrote:
>> JulĀ  2 14:59:44 mail postfix/smtp[14345]: Untrusted TLS connection
>> established to gmail-smtp-in.l.google.com[173.194.68.27]:25: TLSv1.3
>> with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519
>> server-signature RSA-PSS (2048 bits) server-digest SHA256
> 
> I encountered the same thing ... here's how I fixed it.
> 
> I added the following to main.cf:
> 
> smtp_tls_CApath = /etc/ssl/certs
> smtpd_tls_CApath = /etc/ssl/certs

While that changes the reported TLS connection status from untrusted to
trusted, which certainly looks better, the question remains whether that
is actually true. By installing the package ca-certificates and telling
postfix to trust all of the CA certificates contained therein, you are,
in effect, doing just that: you are trusting all of the CAs in the
package. But are you really? Do you even know them all?

Yes, this is nitpicking, and you and many others may be aware of it or
don't care. But some readers of this mailing list may not be. And I, for
one, find it more accurate when postfix reports "untrusted" for a
certificate whose CA I have indeed not verified than if it says
"trusted" when the CA concerned is completely unknown to me, let alone
its policies.

Cheers,
Tobias

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to