>>>>> "VD" == Viktor Dukhovni <[email protected]> writes:

VD> What sort of limit did you have in mind.  The default is 20 per
VD> nexthop domain (per recipient when the transports recipient
VD> concurrency is 1).  Split randomly across the domain's MX hosts.
VD> This is unlikely to be a problem.

One or two sockets per MX.

>> Each subset of messages has a different +extension in the localpart.

VD> This would only matter if you set the transport's recipient
VD> concurrency to 1.  Then mail is queued by recipient, rather than
VD> by domain.

That was my impression, but just in case I read it wrong it seemed
useful to note the fact.

>> Ideally, I'd like it to open one to each of the equal-priority MXs,
>> starttls with each, and dump the mails between them until the queue
>> drains.

VD> If you set the concurrency limit to equal the MX host count, you
VD> get roughly this on average, but each message is delivered over a
VD> separate connection, and the connection distribution is random,
VD> not round-robin.

That is exactly what I attempted with the below configs.

>> smtp_destination_concurrency_limit = 2
>> smtp_connection_cache_destinations = jhcloos.com

VD> TLS and connection caching are mutually exclusive.

>> but still get as many Verified TLS connection established messages in
>> the logs as status=sent lines.

VD> See above.  However, at most two delivery agents have open connections
VD> at any time with the above settings.

I got more than that.  The vendor saw more than a dozen concurrent
outgoings before I added the above two configs.  Which was a problem,
until I explained that I was only sending to myself.

And while testing, I saw more ESTABLISHED at a time, too.  Even after
adding the above two lines.

>> Do any of:
>> 
>> smtp_use_tls=yes
>> smtp_enforce_tls=yes

VD> These are obsolete, and should be removed from main.cf.  They are
VD> only used when smtp_tls_security_level is empty.

Cool.

>> smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
>> smtp_tls_security_level = dane

VD> This turns on opportunistic DANE TLS.

Intentionally.  I like using that better than smtp_tls_policy_maps,
given that I publish tlsa for my MXs.

>> smtp_tls_note_starttls_offer = yes

VD> This is not needed when TLS is on by default.

Like the use_tls, it was copied from old configs which have been
incrementally updated.

>> interfere with concurrency limits?

VD> No, but TLS and connection caching are mutually exclusive (for
VD> destinations that support STARTTLS, non-TLS destinations are still
VD> cached).

Any chance of changing that in future versions?

There should be no reason to have to use separate connections per
message just because tls is used.

-JimC
-- 
James Cloos <[email protected]>         OpenPGP: 0x997A9F17ED7DAEA6

Reply via email to