Hello Viktor
Thanks for your Answer..... the creation of this Cert are the following:

The one key-type are for RSA and ECDSA
        Acme.sh certonly --standalone --rsa-key-size 4096 --domain 
nmail.caloro.ch --key-type rsa --cert-name nmail.caloro.ch-rsa
        Acme.sh certonly --standalone --rsa-key-size 4096 --domain 
nmail.caloro.ch --key-type ecdsa --cert-name nmail.caloro.ch-ecdsa

yes, iam looking forward and willing to implement this, sorry but I think this 
are similar but now all the same key.

## TLS/SSL
        /etc/letsencrypt/live/nmail.caloro.ch/privkey.pem
        /etc/letsencrypt/live/nmail.caloro.ch/fullchain.pem
## RSA
        /etc/letsencrypt/live/nmail.caloro.ch-rsa/privkey.pem
        /etc/letsencrypt/live/nmail.caloro.ch-rsa/fullchain.pem

>These are the same as the below.
Corrected now to other folder(writing error)
## ECDSA
        /etc/letsencrypt/live/nmail.caloro.ch-ecdsa/privkey.pem
        /etc/letsencrypt/live/nmail.caloro.ch-ecdsa/fullchain.pem

Me goal are to implement this for me server.
----->> https://www.postfix.org/TLS_README.html
        >    # Postfix ≥ 3.4.
        >    # Storing keys separately from the associated certificates is not
        >    # recommended.
        >    smtp_tls_chain_files =
        >        /etc/postfix/rsakey.pem,
        >        /etc/postfix/rsacerts.pem,
        >        /etc/postfix/ecdsakey.pem,
        >        /etc/postfix/ecdsacerts.pem

>The update remains: stick to just one key type for now.
Yes at this time no forwarding possibilities, thanks for possible update

Maurizio


-----Ursprüngliche Nachricht-----
Von: owner-postfix-us...@postfix.org <owner-postfix-us...@postfix.org> Im 
Auftrag von Viktor Dukhovni
Gesendet: Dienstag, 31. Mai 2022 13:41
An: postfix-users@postfix.org
Betreff: Re: AW: RSA and ECDSA - warning: No certs for key at index 1

On Tue, May 31, 2022 at 01:05:57PM +0200, Maurizio Caloro wrote:

> Today create new my key file RSA, and ECDSA, and signed with certbot.
> 
> ## TLS/SSL
>       /etc/letsencrypt/live/nmail.caloro.ch/privkey.pem
>       /etc/letsencrypt/live/nmail.caloro.ch/fullchain.pem

What does "TLS/SSL" mean?

> ## RSA Key
>       /etc/letsencrypt/live/nmail.caloro.ch-rsa/privkey.pem
>       /etc/letsencrypt/live/nmail.caloro.ch-rsa/fullchain.pem

These are the same as the below.

> ## ECDSA Key
>       /etc/letsencrypt/live/nmail.caloro.ch-rsa/privkey.pem
>       /etc/letsencrypt/live/nmail.caloro.ch-rsa/fullchain.pem

These are the same as the above.

> [main.cf]
> smtpd_tls_chain_files =
>       /etc/letsencrypt/live/nmail.caloro.ch/privkey.pem,
>       /etc/letsencrypt/live/nmail.caloro.ch/fullchain.pem,

What key type is this?

>       /etc/letsencrypt/live/nmail.caloro.ch-rsa/privkey.pem,
>       /etc/letsencrypt/live/nmail.caloro.ch-rsa/fullchain.pem

Perhaps both are RSA keys?  You can only have on certificate per key type.

> # smtpd_tls_cert_file =
> /etc/letsencrypt/live/nmail.caloro.ch-rsa/privkey.pem
> # smtpd_tls_key_file =
> /etc/letsencrypt/live/nmail.caloro.ch-rsa/fullchain.pem
> # smtpd_tls_eccert_file =
> /etc/letsencrypt/live/nmail.caloro.ch-ecdsa/privkey.pem
> # smtpd_tls_eckey_file =
> /etc/letsencrypt/live/nmail.caloro.ch-ecdsa/fullchain.pem

When you specify "chain_files", you should not also attempt to specify 
"key_file", "cert_file", "eckey_file"  and "eccert_file", because these are 
superseded by "chain_file" and ignored.

> smtpd_tls_received_header = yes
> smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt

You don't need an "smtpd_tls_CAfile" unless you're soliciting client 
certificates, and even then don't specify the standard trust bundle, that 
causes the TLS handlshake to bloat with the complete list of trusted CA names...

> -- thanks for any update

The update remains: stick to just one key type for now.
-- 
    Viktor.

Reply via email to