On 8/20/2020 6:01 PM, Viktor Dukhovni wrote: > I don't recall seeing any logging posted showing those initial > validation failures. This might be as good a time as any to address > that (the failure logs for the initial connection should have been part > of the post that started this thread).
Those are the logs from my first mail addressing the problem: 2020-08-13T07:39:39.007186+02:00 server postfix/tlsproxy[47119]: certificate verification failed for remote.domain.tld[10.11.12.13]:25: untrusted issuer /C=PL/O=Unizeto Sp. z o.o./CN=Certum CA 2020-08-13T07:39:39.007423+02:00 server postfix/tlsproxy[47119]: Untrusted TLS connection established to remote.domain.tld[10.11.12.13]:25: TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) 2020-08-13T07:39:39.007537+02:00 server postfix/smtp[26187]: Untrusted TLS connection established to remote.domain.tld[10.11.12.13]:25: TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) on the next delivery attempt the connection re-use seem to lead to the fact that the verification isn't processed again, although the last delivery attempt failed due to a mandatory TLS configuration (secure): 2020-08-13T07:47:55.233536+02:00 server postfix/tlsproxy[58527]: remote.domain.tld[10.11.12.13]25: re-using session with untrusted certificate, look for details earlier in the log 2020-08-13T07:47:55.233633+02:00 server postfix/tlsproxy[58527]: Untrusted TLS connection established to remote.domain.tld[10.11.12.13]:25: TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) 2020-08-13T07:47:55.233705+02:00 server postfix/smtp[44608]: Untrusted TLS connection established to remote.domain.tld[10.11.12.13]:25: TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) 2020-08-13T07:47:55.235003+02:00 server postfix/smtp[44608]: 123QUEUEID: to=<lo...@domain.tld>, relay=remote.domain.tld[10.11.12.13]:25, delay=497, delays=496/0/0.12/0, dsn=4.7.5, status=deferred (Server certificate not trusted) On the first delivery attempt there is not mentioned "re-using session with untrusted certificate, look for details earlier in the log" so I assumed that there was no session cached, is that assumption wrong? > I hope you're not still conflating session resumption with connection > reuse. If I got it right, the tlsproxy is only handling the certificate validation in case connection_reuse is on, I am actually neither assuming a session issue nor a connection reuse issue but somehow an issue with the certificate validation in tlsproxy. Which is why I want to check if the problem still occurs with connection_reuse=no off in the tls_policy_maps after I gathered some further logging with a higher log level. Is there any difference between turning connection reuse off in tls policy maps or in a transport so that the transport method should be preferred?