Re: how to debug TLS certificate verification error?

2020-02-17 Thread Earl Killian
Victor, thank you for your two helpful replies. I do intend to read through the approaches you suggested, and most likely implement them. My high-priority was to get the mail flowing again, which your first helpful reply let me do. Indeed, I postponed replying because I wanted to read the items yo

Re: how to debug TLS certificate verification error?

2020-02-16 Thread Viktor Dukhovni
On Sun, Feb 16, 2020 at 01:41:16PM -0500, Viktor Dukhovni wrote: > ; Suggested more robust TLSA record management approaches can be found > via: > > > https://github.com/internetstandards/toolbox-wiki/blob/master/DANE-for-SMTP-how-to.md > https://mail.sys4.de/pipermail/dan

Re: how to debug TLS certificate verification error?

2020-02-16 Thread Viktor Dukhovni
> On Feb 16, 2020, at 3:18 PM, Bernardo Reino wrote: > > May I ask you where to find/download your hsdig tool? > > (a quick search indicates that it's some Haskell tool written by yourself, > but I can't seem to find it :) I've not made it available to the public. You can get essentially simi

Re: how to debug TLS certificate verification error?

2020-02-16 Thread Bernardo Reino
On Sun, 16 Feb 2020, Viktor Dukhovni wrote: As luck would have it, you've come to the right place. Your domain is DNSSEC-signed, and your MX host has DANE TLSA records: $ hsdig -t a maple.killian.com maple.killian.com. IN A 199.165.155.8 ; NoError AD=1 [...] May I ask you where to fin

Re: how to debug TLS certificate verification error?

2020-02-16 Thread Viktor Dukhovni
n.com. IN TLSA 3 0 1 7a668f4b7f418a618a9e1043b644c282d55e5ead0ff20acaa4db5357a9764a2f ; NoError AD=1 > Comcast claims a TLS certificate verify failure. I have checked the TLS > connection process with Comcast (and not only they) support and enforce DANE. > Diagnostic-Code: smtp; TLS negotiation: certificate ver

how to debug TLS certificate verification error?

2020-02-16 Thread Earl Killian
debugging advice to figure out what the problem might be. Comcast claims a TLS certificate verify failure. I have checked the TLS connection process with openssl s_client -connect maple.killian.com:25 -starttls smtp and it looks good. I also checked with https://www.checktls.com and got all 100

unknown tls certificate problem: EVP_MD_size:message digest is null

2019-04-19 Thread Chris Thomas
Hi, I am using a letsencrypt tls cert and whenever I receive email, I get the following error. Is this a problem with my certificate? Or with the configuration or something?? postfix/smtpd[526]: warning: TLS library problem: error:060A209F:digital envelope routines:EVP_MD_size:message digest is n

Re: Use 1 TLS certificate for multiple domains

2017-07-27 Thread Z3us Linux
Thank you Viktor! Totally clear to me now. Greetings 2017-07-26 16:43 GMT+02:00 Viktor Dukhovni : > > > On Jul 26, 2017, at 6:01 AM, Z3us Linux wrote: > > > > I'm running Postfix with MailScanner as a spamfilter for multiple > domains/customers. > > Is it possible to create a TLS configuration

Re: Use 1 TLS certificate for multiple domains

2017-07-26 Thread Viktor Dukhovni
> On Jul 26, 2017, at 6:01 AM, Z3us Linux wrote: > > I'm running Postfix with MailScanner as a spamfilter for multiple > domains/customers. > Is it possible to create a TLS configuration to force encryption for a set of > domains with one 1 SSL certificate for the FQDN of the mailserver? Depl

Use 1 TLS certificate for multiple domains

2017-07-26 Thread Z3us Linux
I'm running Postfix with MailScanner as a spamfilter for multiple domains/customers. Is it possible to create a TLS configuration to force encryption for a set of domains with one 1 SSL certificate for the FQDN of the mailserver? The MX-records of the hosted domains are pointing to my mailserver an

Re: Outbound TLS Certificate Verification

2017-06-16 Thread Wietse Venema
Osama Al-Hassani: > > Which Postfix SMTP client implementation matches server certificates > > against server IP addresses? > > We are using 3.2.0 vanilla. > > To clarify, this is when using the "match" attribute with "verify" security > level. I could rephrase the question as to why anything

RE: Outbound TLS Certificate Verification

2017-06-16 Thread Osama Al-Hassani
DNS names are ignored in the SANs field? Thanks, Osama -Original Message- From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of Wietse Venema Sent: 15 June 2017 21:47 To: Postfix users Subject: Re: Outbound TLS Certificate Verification Os

Re: Outbound TLS Certificate Verification

2017-06-15 Thread Wietse Venema
; Osama > > -Original Message- > From: owner-postfix-us...@postfix.org > [mailto:owner-postfix-us...@postfix.org] On Behalf Of Viktor Dukhovni > Sent: 15 June 2017 01:33 > To: postfix-users@postfix.org > Subject: Re: Outbound TLS Certificate Verification > > On W

RE: Outbound TLS Certificate Verification

2017-06-15 Thread Osama Al-Hassani
...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of Viktor Dukhovni Sent: 15 June 2017 01:33 To: postfix-users@postfix.org Subject: Re: Outbound TLS Certificate Verification On Wed, Jun 14, 2017 at 09:12:20PM +, Osama Al-Hassani wrote: > When verifying server certificates on outbo

RE: Inbound TLS Certificate SAN Verification

2017-06-15 Thread Osama Al-Hassani
: Re: Inbound TLS Certificate SAN Verification On Wed, Jun 14, 2017 at 08:47:31PM +, Osama Al-Hassani wrote: > When verifying client certificates we are only able to receive CN > data, and cannot get a hold of the SANs. The request data sent to the > policy server does not contai

Re: Inbound TLS Certificate SAN Verification

2017-06-14 Thread Viktor Dukhovni
On Wed, Jun 14, 2017 at 08:47:31PM +, Osama Al-Hassani wrote: > When verifying client certificates we are only able to receive CN data, > and cannot get a hold of the SANs. The request data sent to the policy > server does not contain any SAN attributes. That's correct. The subject alternat

Re: Outbound TLS Certificate Verification

2017-06-14 Thread Viktor Dukhovni
On Wed, Jun 14, 2017 at 09:12:20PM +, Osama Al-Hassani wrote: > When verifying server certificates on outbound connections, it seems we > are unable verify the IP addresses part of the SANs field. We are able to > verify IPs in CNs. Email is sent to addresses of the form , where the "domain-p

Outbound TLS Certificate Verification

2017-06-14 Thread Osama Al-Hassani
Hi all, When verifying server certificates on outbound connections, it seems we are unable verify the IP addresses part of the SANs field. We are able to verify IPs in CNs. What is the reasoning behind this behaviour? Thank you, Osama Osama Al-Hassani Software Engineer [Telephone] +44 118

Inbound TLS Certificate SAN Verification

2017-06-14 Thread Osama Al-Hassani
Hi all, I have an enquiry regarding SAN verification when enforcing TLS on inbound connections. When verifying client certificates we are only able to receive CN data, and cannot get a hold of the SANs. The request data sent to the policy sever does not contain any SAN attributes. Is there a

Re: how to replicate Sendmail TLS certificate validation

2016-05-31 Thread Viktor Dukhovni
> On May 31, 2016, at 10:16 AM, Viktor Dukhovni > wrote: > >main.cf: > smtpd_client_restrictions = > cidr = cidr:${config_directory}/ > check_client_access ${cidr}clnt-access Oops, bad syntax, that should be: main.cf: cidr = cidr:${config_directory}/

Re: how to replicate Sendmail TLS certificate validation

2016-05-31 Thread Viktor Dukhovni
> On May 31, 2016, at 10:01 AM, Rob Maidment wrote: > > I have clients where I'd like to replace Sendmail with Postfix however > they have incoming mail requirements that prevent this, as far as I > can tell. These are not so much to do with certificate validation but > more fundamentally wheth

Re: how to replicate Sendmail TLS certificate validation

2016-05-31 Thread Rob Maidment
Thank you Wietse and Viktor for your in-depth responses. It seems to me that the Postfix SMTP client has all the TLS options of Sendmail and then some, however the Postfix SMTP server does not offer the same level of granularity as Sendmail when it comes to applying TLS to incoming connections. I

Re: how to replicate Sendmail TLS certificate validation

2016-05-26 Thread Viktor Dukhovni
On Thu, May 26, 2016 at 05:44:28PM +0100, Rob Maidment wrote: > VERIFY verification must have succeeded Note, this does not check the peer name, it only checks the validity of the chain. > VERIFY:bits verification must have succeeded and ${cipher_bits} must > be greater than or equal bits. > ENC

Re: how to replicate Sendmail TLS certificate validation

2016-05-26 Thread Wietse Venema
Rob Maidment: > Looking at the Postfix configuration pages I can see how the > smtp_tls_policy_maps option can be used to enable verification of > remote server certificates When Postfix is the client but there > doesn't seem to be the same level of control over what verification > takes place exac

how to replicate Sendmail TLS certificate validation

2016-05-26 Thread Rob Maidment
Hello Sendmail has a number of TLS certificate validation options described here: http://www.sendmail.co.uk/sm/open_source/docs/m4/starttls.html#allow_con VERIFY verification must have succeeded VERIFY:bits verification must have succeeded and ${cipher_bits} must be greater than or equal bits

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-24 Thread Viktor Dukhovni
On Thu, Oct 24, 2013 at 07:59:46AM +0200, Tobias Reckhard wrote: > > Support for public key fingerprints was added in Postfix 2.9, ... > > This is stated at the beginning of the section dealing with > fingerprints. Further down, where the actual openssl commands are noted, > there is no such not

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-23 Thread Tobias Reckhard
Viktor Dukhovni wrote the following on 23.10.2013 16:23: > If your Postfix version is 2.9.0--2.9.5 DO NOT USE public key > fingerprints, or upgrade to 2.9.6 or later. That wasn't the problem, the documentation is quite clear in this regard. I mistakenly used the public key instructions for a pre-2

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-23 Thread Viktor Dukhovni
On Wed, Oct 23, 2013 at 09:39:36AM +0200, Tobias Reckhard wrote: > > with instructions on how to extract public key digests from X.509 > > certs also at: > > > > http://www.postfix.org/postconf.5.html#smtp_tls_fingerprint_digest > > Those instructions had me confused a bit, I think I now see

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-22 Thread Viktor Dukhovni
On Tue, Oct 22, 2013 at 10:58:46AM -0400, Wietse Venema wrote: > > Fingerprinting the leaf certificate will work until the next time > > they deploy a new leaf certificate without notifying you in advance. > > This is because fingerprint security does not rely on a valid chain > > of signatures fr

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-22 Thread Wietse Venema
Viktor Dukhovni: > On Tue, Oct 22, 2013 at 11:07:07AM +0200, Tobias Reckhard wrote: > > > Maybe fingerprinting would work, though. I'll give it a shot on a test > > system. Thanks for the suggestion. > > Fingerprinting the leaf certificate will work until the next time > they deploy a new leaf ce

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-22 Thread Viktor Dukhovni
On Tue, Oct 22, 2013 at 11:01:22AM +0200, Tobias Reckhard wrote: > > The most recent patch levels > > of Postfix 2.7, 2.8, 2.9 and 2.10 have support for SHA256 turned for > > SSL/TLS. > > postfix 2.8.5 is available as a backport for Ubuntu 10.04 LTS. I've > suggested upgrading to that, since it

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-22 Thread Viktor Dukhovni
On Tue, Oct 22, 2013 at 11:07:07AM +0200, Tobias Reckhard wrote: > Maybe fingerprinting would work, though. I'll give it a shot on a test > system. Thanks for the suggestion. Fingerprinting the leaf certificate will work until the next time they deploy a new leaf certificate without notifying you

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-22 Thread Tobias Reckhard
Viktor Dukhovni wrote the following on 21.10.2013 17:21: > On Mon, Oct 21, 2013 at 10:07:13AM -0500, Noel Jones wrote: >> Looks as if they use a private root CA. Probably the easiest fix is >> to use "fingerprint" verification. See: >> http://www.postfix.org/postconf.5.html#smtp_tls_policy_maps >

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-22 Thread Tobias Reckhard
Viktor Dukhovni wrote the following on 21.10.2013 17:30: > This organization uses SHA256 signatures for their certificates, even > though these are not widely supported. Ah, OK, thanks for the explanation. > The most recent patch levels > of Postfix 2.7, 2.8, 2.9 and 2.10 have support for SHA256

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-21 Thread Viktor Dukhovni
On Mon, Oct 21, 2013 at 03:30:46PM +, Viktor Dukhovni wrote: > On Mon, Oct 21, 2013 at 02:55:22PM +0200, Tobias Reckhard wrote: > > > Oct 21 08:43:58 postfix/smtp[5991]: CA certificate > > verification failed for mx10.unicredit.eu[62.122.80.93]:25: > > num=7:certificate signature failure >

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-21 Thread Viktor Dukhovni
On Mon, Oct 21, 2013 at 10:07:13AM -0500, Noel Jones wrote: > > Oct 21 08:43:58 postfix/smtp[5991]: CA certificate > > verification failed for mx10.unicredit.eu[62.122.80.93]:25: > > num=7:certificate signature failure > > Looks as if they use a private root CA. Probably the easiest fix is > to

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-21 Thread Viktor Dukhovni
On Mon, Oct 21, 2013 at 02:55:22PM +0200, Tobias Reckhard wrote: > Oct 21 08:43:58 postfix/smtp[5991]: CA certificate > verification failed for mx10.unicredit.eu[62.122.80.93]:25: > num=7:certificate signature failure This organization uses SHA256 signatures for their certificates, even though t

Re: TLS: Certificate signature failure -- what is the reason?

2013-10-21 Thread Noel Jones
On 10/21/2013 7:55 AM, Tobias Reckhard wrote: > Hello > > In configuring a postfix 2.7.0 (on Ubuntu 10.04 LTS) for mandatory TLS > to a couple of domains, I'm running into the following oddity when > sending e-mail to the UniCredit servers: > > Oct 21 08:43:58 postfix/smtp[5991]: CA certificate

TLS: Certificate signature failure -- what is the reason?

2013-10-21 Thread Tobias Reckhard
Hello In configuring a postfix 2.7.0 (on Ubuntu 10.04 LTS) for mandatory TLS to a couple of domains, I'm running into the following oddity when sending e-mail to the UniCredit servers: Oct 21 08:43:58 postfix/smtp[5991]: CA certificate verification failed for mx10.unicredit.eu[62.122.80.93]:25:

Re: TLS certificate validation woes

2011-12-20 Thread Viktor Dukhovni
On Tue, Dec 20, 2011 at 10:24:04AM +0100, lst_ho...@kwsoft.de wrote: > As far as I understand you have to list the complete chain but only > your sub-CA to get it working. This is not the case: http://www.postfix.org/TLS_README.html#server_access Allow the remote SMTP client request

Re: TLS certificate validation woes

2011-12-20 Thread Bernhard Schmidt
Am 20.12.2011 14:30, schrieb lst_ho...@kwsoft.de: Hi, Any idea how to allow all certificates issued by specific Sub-CAs, without trusting everyone? >>> >>> As far as i understand you have to list the complete chain but only your >>> sub-CA to get it working. So create a smtpd_tls_CAfile

Re: TLS certificate validation woes

2011-12-20 Thread lst_hoe02
Zitat von Bernhard Schmidt : Am 20.12.2011 10:24, schrieb lst_ho...@kwsoft.de: Hello, Any idea how to allow all certificates issued by specific Sub-CAs, without trusting everyone? As far as i understand you have to list the complete chain but only your sub-CA to get it working. So create a

Re: TLS certificate validation woes

2011-12-20 Thread Bernhard Schmidt
Am 20.12.2011 10:24, schrieb lst_ho...@kwsoft.de: Hello, >> Any idea how to allow all certificates issued by specific Sub-CAs, >> without trusting everyone? > > As far as i understand you have to list the complete chain but only your > sub-CA to get it working. So create a smtpd_tls_CAfile with

Re: TLS certificate validation woes

2011-12-20 Thread lst_hoe02
Zitat von Bernhard Schmidt : Hi, I'm having an issue I can't quite understand at the moment. We are part of a larger PKI infrastructure run by the german NREN, which is in the end rooted at the Deutsche Telekom. - Deutsche Telekom Root CA 2 - DFN-Verein PCA Global - G01 - LRZ-CA - G0

TLS certificate validation woes

2011-12-20 Thread Bernhard Schmidt
Hi, I'm having an issue I can't quite understand at the moment. We are part of a larger PKI infrastructure run by the german NREN, which is in the end rooted at the Deutsche Telekom. - Deutsche Telekom Root CA 2 - DFN-Verein PCA Global - G01 - LRZ-CA - G01 <-- this is ours - som

Re: TLS - Certificate not Trusted

2010-01-11 Thread LuKreme
On 11-Jan-2010, at 09:27, Dennis Putnam wrote: > I am quite familiar with the arguments but again it is not my choice. If you > want, I can give you the number of our corporate lawyers and you can try to > convince them. Perhaps you will have better luck than me. :-) I will be happy to email th

Re: TLS - Certificate not Trusted

2010-01-11 Thread Victor Duchovni
On Mon, Jan 11, 2010 at 11:36:42AM -0600, Noel Jones wrote: > According to the example in > http://www.postfix.org/TLS_README.html#client_tls_policy > the policy table should contain > > somedomain.tld encrypt > > To include subdomains of somedomain.tld also include > > .somedomain.tld

Re: TLS - Certificate not Trusted

2010-01-11 Thread Noel Jones
On 1/11/2010 11:16 AM, Dennis Putnam wrote: Hi Noel, Thanks. I thing you pointed me in the right direction. Am I correct that the per_site table is different under 2.5.5 than pre 2.3? I had trouble getting that to work on the old server so I didn't change it for the migration. What I have is: .

Re: TLS - Certificate not Trusted

2010-01-11 Thread Dennis Putnam
Hi Noel, Thanks. I thing you pointed me in the right direction. Am I correct that the per_site table is different under 2.5.5 than pre 2.3? I had trouble getting that to work on the old server so I didn't change it for the migration. What I have is: .somedomain.com MUST I think it now can be

Re: TLS - Certificate not Trusted

2010-01-11 Thread Noel Jones
On 1/11/2010 10:38 AM, Dennis Putnam wrote: Upon further investigation, apparently mail is not moving. There seems to be 2 domains associated with this site but I was only asked to enforce TLS on one of them. That is why it appeared to be working. Getting back to Chris' comments, I think setting

Re: TLS - Certificate not Trusted

2010-01-11 Thread /dev/rob0
On Mon, Jan 11, 2010 at 11:53:35AM -0500, Noah Sheppard wrote: [attribution to Chris is missing] > > >> On Mon, 2010-01-11 at 11:04 -0500, Dennis Putnam wrote: > > >>> I want to enforce TLS but I don't care what certificate the > > >>> receiver uses. Thanks. > > >> Apart from the fact that enforci

Re: TLS - Certificate not Trusted

2010-01-11 Thread Noah Sheppard
> >> On Mon, 2010-01-11 at 11:04 -0500, Dennis Putnam wrote: > >>> I want to enforce TLS but I don't care what certificate the receiver > >>> uses. Thanks. > >> Apart from the fact that enforcing TLS with SMTP is usually a bad idea, > >> [..] Why is TLS w/ SMTP a bad idea? -- Noah Sheppard Assis

Re: TLS - Certificate not Trusted

2010-01-11 Thread Dennis Putnam
Upon further investigation, apparently mail is not moving. There seems to be 2 domains associated with this site but I was only asked to enforce TLS on one of them. That is why it appeared to be working. Getting back to Chris' comments, I think setting the security level to 'encrypt' forces ever

Re: TLS - Certificate not Trusted

2010-01-11 Thread Dennis Putnam
Hi Chris, Thanks for the reply. Please see embedded comments. On Jan 11, 2010, at 11:11 AM, Christoph Anton Mitterer wrote: > On Mon, 2010-01-11 at 11:04 -0500, Dennis Putnam wrote: >> I want to enforce TLS but I don't care what certificate the receiver >> uses. Thanks. > Apart from the fact tha

Re: TLS - Certificate not Trusted

2010-01-11 Thread Christoph Anton Mitterer
On Mon, 2010-01-11 at 11:04 -0500, Dennis Putnam wrote: > I want to enforce TLS but I don't care what certificate the receiver > uses. Thanks. Apart from the fact that enforcing TLS with SMTP is usually a bad idea, setting the smtp_tls_security_level = encrypt should usually do what you mean, enfor

TLS - Certificate not Trusted

2010-01-11 Thread Dennis Putnam
I'm just getting started with version 2.5.5 and TLS is different that my previous version. I have everything thing working except some email will not go out because of the error "delivery temporarily suspended: Server certificate not trusted." What parameter do I have wrong that requires trusted

Re: Fwd: Re: TLS certificate

2009-02-10 Thread Tolga
On Fri, 6 Feb 2009 12:15:26 -0500, Victor Duchovni wrote: > On Fri, Feb 06, 2009 at 07:13:17PM +0200, Tolga wrote: > >> > Who can't use the certificate? >> >> I, when I try with Thunderbird from another location. > > Well, it is Thunderbird that needs to extend its list of trusted > CAs not Po

Re: Fwd: Re: TLS certificate

2009-02-09 Thread Tolga
Victor Duchovni yazmış: On Fri, Feb 06, 2009 at 07:13:17PM +0200, Tolga wrote: Who can't use the certificate? I, when I try with Thunderbird from another location. Well, it is Thunderbird that needs to extend its list of trusted CAs not Postfix. No amount of tweaking the Pos

TLS Certificate Client-auth support with "high sec" Certificates broken? (not SASL)

2009-02-09 Thread Juergen P. Meier
='-DHAS_PCRE -DUSE_TLS -I/opt/openssl/include -I/usr/local/include' OPT='-O' DEBUG='' 'AUXLIBS=-L/usr/local/lib -lpcre -L/opt/openssl/lib -lssl -lcrypto -L/usr/local/lib' Setup: 1. Smarthost with TLS Certificate User auth (for relaying) ("wurzel")

Re: Fwd: Re: TLS certificate

2009-02-06 Thread Victor Duchovni
On Fri, Feb 06, 2009 at 07:13:17PM +0200, Tolga wrote: > > Who can't use the certificate? > > I, when I try with Thunderbird from another location. Well, it is Thunderbird that needs to extend its list of trusted CAs not Postfix. No amount of tweaking the Postfix server will make Thunderbird tru

Fwd: Re: TLS certificate

2009-02-06 Thread Tolga
Forgot to CC it. Original Message Subject: Re: TLS certificate Date: Fri, 06 Feb 2009 19:11:43 +0200 From: Tolga To: Patrick Ben Koetter On Fri, 6 Feb 2009 15:58:29 +0100, Patrick Ben Koetter wrote: > * Tolga : >>> Here's your error: "unab

Re: TLS certificate

2009-02-06 Thread Victor Duchovni
On Fri, Feb 06, 2009 at 11:28:17AM +0100, Patrick Ben Koetter wrote: > Here's your error: "unable to verify the first certificate". Did you add your > CA certificate to your CA certificate store ca-bundles.crt (in your case)? In what sense is that an "error"? He's got a private-label CA cert, why

Re: TLS certificate

2009-02-06 Thread Patrick Ben Koetter
* Tolga : >> Here's your error: "unable to verify the first certificate". Did you add your >> CA certificate to your CA certificate store ca-bundles.crt (in your case)? >> >> p...@rick >> > I just did that, restarted postfix, and when I did an openssl s_client > -starttls smtp -CAfile /etc/ssl

Re: TLS certificate

2009-02-06 Thread Tolga
Patrick Ben Koetter yazmış: * Tolga : Please show evidence of such a session. to...@ozses:~$ openssl s_client -starttls smtp -CApath /etc/ssl/private -connect localhost:25 CONNECTED(0003) depth=0 /C=TR/ST=Marmara/L=Istanbul/O=ozses.net/OU=ozses.net/CN=mail.ozses.net/emailaddre

Re: TLS certificate

2009-02-06 Thread Patrick Ben Koetter
* Tolga : > > Please show evidence of such a session. > > to...@ozses:~$ openssl s_client -starttls smtp -CApath /etc/ssl/private > -connect localhost:25 > CONNECTED(0003) > depth=0 > /C=TR/ST=Marmara/L=Istanbul/O=ozses.net/OU=ozses.net/CN=mail.ozses.net/emailaddress=to...@ozses.net > verify

Re: TLS certificate

2009-02-06 Thread Tolga
On Thu, Feb 05, 2009 at 07:43:38PM +0100, Patrick Ben Koetter wrote: > * Tolga : > > On Thu, Feb 05, 2009 at 04:25:50PM +0100, Patrick Ben Koetter wrote: > > > * Tolga : > > > > I am reading The Book of Postfix, I applied the steps CA.pl -newca, > > > > openssl > > > > req -new -nodes -keyout priv

Re: TLS certificate

2009-02-05 Thread Tolga
On Thu, Feb 05, 2009 at 07:43:38PM +0100, Patrick Ben Koetter wrote: > * Tolga : > > On Thu, Feb 05, 2009 at 04:25:50PM +0100, Patrick Ben Koetter wrote: > > > * Tolga : > > > > I am reading The Book of Postfix, I applied the steps CA.pl -newca, > > > > openssl > > > > req -new -nodes -keyout priv

Re: TLS certificate

2009-02-05 Thread Patrick Ben Koetter
* Tolga : > On Thu, Feb 05, 2009 at 04:25:50PM +0100, Patrick Ben Koetter wrote: > > * Tolga : > > > I am reading The Book of Postfix, I applied the steps CA.pl -newca, > > > openssl > > > req -new -nodes -keyout privatekey.pem -out privatekey.pem -days 1825 and > > > openssl ca -policy policy_any

Re: TLS certificate

2009-02-05 Thread Tolga
On Thu, Feb 05, 2009 at 04:25:50PM +0100, Patrick Ben Koetter wrote: > * Tolga : > > I am reading The Book of Postfix, I applied the steps CA.pl -newca, openssl > > req -new -nodes -keyout privatekey.pem -out privatekey.pem -days 1825 and > > openssl ca -policy policy_anything -out publiccert.pem -

Re: TLS certificate

2009-02-05 Thread Patrick Ben Koetter
* Tolga : > I am reading The Book of Postfix, I applied the steps CA.pl -newca, openssl > req -new -nodes -keyout privatekey.pem -out privatekey.pem -days 1825 and > openssl ca -policy policy_anything -out publiccert.pem -infiles > privatekey.pem , copied the key and cert under /etc/ssl/private and

TLS certificate

2009-02-05 Thread Tolga
Hello, I am reading The Book of Postfix, I applied the steps CA.pl -newca, openssl req -new -nodes -keyout privatekey.pem -out privatekey.pem -days 1825 and openssl ca -policy policy_anything -out publiccert.pem -infiles privatekey.pem , copied the key and cert under /etc/ssl/private and /etc/s