On Sun, Apr 10, 2022 at 10:44:05AM +0200, Admin Beckspaced wrote:

> Dehydrated has the option for different certificate types so I went with 
> ECDSA and RSA
> 
> https://github.com/dehydrated-io/dehydrated/blob/master/docs/domains_txt.md
> 
> Added the following to main.cf
> 
> # RSA default
> smtp_tls_cert_file = 
> /etc/dehydrated/certs/mail-beckspaced-com-rsa/fullchain.pem
> smtp_tls_key_file = /etc/dehydrated/certs/mail-beckspaced-com-rsa/privkey.pem
> 
> # ECDSA optional
> smtp_tls_eccert_file = 
> /etc/dehydrated/certs/mail-beckspaced-com-ecdsa/fullchain.pem
> smtp_tls_eckey_file = 
> /etc/dehydrated/certs/mail-beckspaced-com-ecdsa/privkey.pem
> 
> postfix docs recommend to use smtpd_tls_chain_files
> 
> https://www.postfix.org/postconf.5.html#smtpd_tls_chain_files
> 
> would it be as easy to just add the following to main.cf to use the 
> reommended setting?
> 
> smtpd_tls_chain_files =
>       /etc/dehydrated/certs/mail-beckspaced-com-rsa/privkey.pem
>       /etc/dehydrated/certs/mail-beckspaced-com-rsa/fullchain.pem
>       /etc/dehydrated/certs/mail-beckspaced-com-ecdsa/privkey.pem
>       /etc/dehydrated/certs/mail-beckspaced-com-ecdsa/fullchain.pem

Yes, and once that works, you can drop the legacy parameters.

Note that loading the key and certificate from separate files introduces
a narrow race condition if the files are being updated from cron while a
Postfix smtpd(8) process is loading keys + certs.

A more robust implementation would follow up the key rotation from cron
with code that combines the key and cert into a single file that is
checked for a matching key + cert prior to an atomic rename into place.

I don't know whether dehydrated supports creation of a "combo" PEM file
that contains key + cert chain all in one.  If not, I'd suggest opening
an issue against the project repo.

-- 
    Viktor.

Reply via email to