On Thu, May 22, 2014 at 10:39:57AM +0200, [email protected] wrote:

> relayhost = relay.domain.com

Had you not obfuscated the relay name, you'd have your answer already.
You should also post log entries exhibiting the unwated behaviour.
Typically ISP relays are hostnames not MX records:

        relayhost = [relay.example.net]

and often use the submission port:

        relayhost = [relay.example.net]:587

> smtpd_tls_cert_file = /etc/ssl/private/server.crt
> smtpd_tls_key_file = /etc/ssl/private/server.key
> smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
> smtpd_tls_security_level = may
> smtp_tls_mandatory_ciphers = high
> smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3
> smtpd_tls_session_cache_database = hash:${data_directory}/smtpd_scache

    That should probably be "smtpd_tls_mandatory_ciphers" or you're
    grouping your settings very poorly.  Use btree, not hash for
    session caches.

> smtp_tls_security_level = fingerprint
> smtp_tls_mandatory_ciphers = high
> smtp_tls_mandatory_protocols = !SSLv2, !SSLv3
> smtp_tls_fingerprint_digest = md5
> smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
> smtpd_tls_session_cache_database = hash:${data_directory}/smtpd_scache
> smtpd_tls_received_header = yes

That should probably be:

    smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache

or you're grouping your settings very poorly and like repeating yourself.

What's in the policy table (entry for the relay)?

Is "fingerprint" really a good idea here?  Will the receiving party
coordinate key rollover with you?  Or are you operating both servers?

-- 
        Viktor.

Reply via email to