On Wed, Jan 23, 2013 at 12:33:01AM -0500, Eric McCorkle wrote:

> Which is due ultimately to there not being a kerberos principal
> available.  However, if I add "start_tls = yes" (and set up the
> certificate files), then I get the same "unable to allocate TLS context"
> error.
> 
> This seems to suggest that the process can't get at the certs (or the
> keytab), but both are readable by the postfix user, and postalias su'ed
> to postfix seems to work fine.
> 
> Not sure if it's relevant, but I have the private key and the keytab
> with permissions set as follows:
> 
> chown root:hostkey <path to key>
> chmod 640 <path to key>
> 
> Where the "hostkey" group includes the postfix user.

This does not work, Postfix daemons don't run with the secondary
groups of the "postfix" user. To use a client certificate for
LDAP you must make it readable by the "postfix" user, via:

        chown postfix client-key.pem
        chmod 600 client-key.pem

The "root" user can still read if required.

-- 
        Viktor.

Reply via email to