On 8/20/2020 6:57 PM, Viktor Dukhovni wrote:
>
> You likely also have had some infrequent unreported issues validating
> "secure" destinations without a configured "tafile", that resolve
> after the cached session expires.
>

> This is relevant, but probably not 100% accurate, likely some domains
> also intermittently failed routine CAfile-based validation.
>

Thanks for the patch.  There was no higher number of certificate
verification failures since I updated to Postfix 3.5.4.

Checking the logs of the last 8 days, there is only one "Server
certificate not trusted" error for a CApath-based configuration and 348
errors for TAfile based configurations.
The number of *CApath* (if that's relevant) based mandatory TLS
configurations per destination is currently FAR higher than the tafile
based configurations.

> Yes, try the below patch (Postfix 3.4 and 3.5 only, NOT NEEDED in
> earlier releases or in Postfix 3.6 or later).
I will get back to you and let you know if the patch helped. Since I
wasn't able to reproduce the problem on the test environment, this might
take a while.
> You're forgiven. :-)

Thanks :-)


On 6/20/2020 10:15 PM, Wietse Venema wrote:
>
> Demo: on a non-DNSSEC host, use "posttls-finger -X " for force
> tlsproxy usage, and specify the remote SMTP server's server's own
> self-signed certificate as the trust anchor.
>
> # posttls-finger -X -A spike.porcupine.org.pem -l secure spike.porcupine.org
>  

Using the command as mentioned is causing:

posttls-finger: fatal: The -X and -r options are mutually exclusive

Hope this patch is suitable:

--- a/src/posttls-finger/posttls-finger.c       2019-02-12
14:17:45.000000000 +0100
+++ b/src/posttls-finger/posttls-finger.c.new   2020-08-21
09:15:04.256945675 +0200
@@ -1988,7 +1988,7 @@
        msg_fatal("bad '-a' option value: %s", state->options.addr_pref);

 #ifdef USE_TLS
-    if (state->tlsproxy_mode && state->reconnect)
+    if (state->tlsproxy_mode && state->reconnect > 0)
        msg_fatal("The -X and -r options are mutually exclusive");
 #endif




Reply via email to