A private CA has issued server certs to mail.example.org. However, when
smtpd from another server in the example.org domain connects to
mail.example.org, TLS validation fails and the message exchange falls back
to smtp+notls

Is there way to add a cert chain somewhere that smtpd will do a chain lookup
in order to trust the TLS connection?

The following log messages show the error:

Mar 14 15:00:32 server smtpd[73240]: e415a0d39ccaa8a6 mta connected
Mar 14 15:00:32 server smtpd[73240]: smtp-out: Error on session 
e415a0d39ccaa8a6: opportunistic TLS failed, downgrading to plain
Mar 14 15:00:32 server smtpd[73240]: e415a0d39ccaa8a6 mta connecting 
address=smtp+notls://100.64.10.1:25 host=mail.example.org
Mar 14 15:00:32 server smtpd[73240]: e415a0d39ccaa8a6 mta connected Mar 14 
15:00:32 server smtpd[73240]: e415a0d39ccaa8a6 mta delivery
evpid=6ad1c44d48964de8 from=<sen...@example.com> to=<recipi...@example.org> 
rcpt=<-> source="100.64.10.9" relay="100.64.10.1
(mail.example.org)" delay=42s result="Ok" stat="250 2.0.0 180e8af2
Message accepted for delivery"

Thanks in advance.

Reply via email to