Thorsten Habich:
> Hello,
> 
> the certificate verification with TA file option still occasionally fails:
> 
> 2020-08-13T07:39:39.007186+02:00 server postfix/tlsproxy[47119]:
> certificate verification failed for remote.domain.tld[10.11.12.13]:25:
> untrusted issuer /C=PL/O=Unizeto Sp. z o.o./CN=Certum CA
> 2020-08-13T07:39:39.007423+02:00 server postfix/tlsproxy[47119]:
> Untrusted TLS connection established to
> remote.domain.tld[10.11.12.13]:25: TLSv1.2 with cipher
> ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
> 2020-08-13T07:39:39.007537+02:00 server postfix/smtp[26187]: Untrusted
> TLS connection established to remote.domain.tld[10.11.12.13]:25: TLSv1.2
> with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

I'll leave it to Viktor and you to figure out why this is
non-deterministic.

Unfortunately this does not show whether the SMTP client proceeds
with the email delivery.

> on the next delivery attempt the connection re-use seem to lead to the
> fact that the verification isn't processed again, although the last
> delivery attempt failed due to a mandatory TLS configuration (secure):

That depends on whether the requirement exists (in smtp(8) and
tlsproxy(8)) that the certificate verification must succeed, and
if that requirement exists, whether that requirement is enforced.

        Wietse

Reply via email to