On 01/23/13 00:51, Eric McCorkle wrote:
> On 01/23/13 00:49, Viktor Dukhovni wrote:
>> On Wed, Jan 23, 2013 at 12:33:01AM -0500, Eric McCorkle wrote:
>>
>>> Which is due ultimately to there not being a kerberos principal
>>> available.  However, if I add "start_tls = yes" (and set up the
>>> certificate files), then I get the same "unable to allocate TLS context"
>>> error.
>>>
>>> This seems to suggest that the process can't get at the certs (or the
>>> keytab), but both are readable by the postfix user, and postalias su'ed
>>> to postfix seems to work fine.
>>>
>>> Not sure if it's relevant, but I have the private key and the keytab
>>> with permissions set as follows:
>>>
>>> chown root:hostkey <path to key>
>>> chmod 640 <path to key>
>>>
>>> Where the "hostkey" group includes the postfix user.
>>
>> This does not work, Postfix daemons don't run with the secondary
>> groups of the "postfix" user. To use a client certificate for
>> LDAP you must make it readable by the "postfix" user, via:
>>
>>      chown postfix client-key.pem
>>      chmod 600 client-key.pem
>>
>> The "root" user can still read if required.
>>
> 
> Well, then that would be the cause.  I'll check it out, but in the mean
> time, thanks for the help!
> 

Yep, that did it.  Thanks.

Reply via email to