On Fri, Jan 07, 2022 at 05:47:55PM -0500, PGNet Dev <pgnet....@gmail.com> wrote:
> > Postfix has no CRL or OCSP support, and none is planned. > > other than reporting the bad result, does the current (bad) config cause any > actual mail delivery breakage? Probably no real harm done. OCSP stapling is just a way to make it more private and more efficient for a web browser to verify that a website's certificate hasn't been revoked, by providing that information in-band, so the browser doesn't have to contact your CA separately. I expect very few SMTP clients actually verify SMTP server certificates(?), so they won't be checking revocation status either, and so it shouldn't matter whether or not OCSP is working as advertised. Even those that do verify the server certificate can contact your CA separately in the absence of OCSP. So nothing should break. Turning off "must staple" is probably the simplest option. You could also have separate certificates for your web server (with must staple) and mail server (without). If you're concerned about the SSLLabs report, don't be. It doesn't penalise for the absence of "must staple". It's only complaining about "must staple" in the absence of stapling being offered. But you might want "must staple" for your website, in case it's compromised, and the attacker turns off OCSP stapling, in the hope that clients won't bother checking revocation status, so they can keep using your certificate after you have revoked it. Having "must staple" would require the clients to check revocation status (via OCSP itself if stapling isn't offered), so they'd find out that you had revoked the compromised certificate. cheers, raf