Go to the table of contents Go to the previous page You are at the end of the document View or print as PDF
Configuring Postfix to Enable Protector TLS Support for Explicit MTA
Configuring Postfix to Enable Protector TLS Support for Explicit MTA
Protector TLS Support | Forcepoint DLP | v8.4.x, v8.5.x, v8.6.x
The Forcepoint DLP protector includes a Postfix release compiled with Transport Layer Security (TLS) support. Configure Postfix to enable TLS support. Although TLS is not officially supported, Postfix is available to allow for individual customer configurations.
This document provides a simple example TLS configuration for use as a test case and as a reference for future deployments.
The sample configuration is stored on the protector in the "/etc/postfix/main.cf" file. Every time the file is modified, reload Postfix using one of the following operations:
*
*
*
In the protector, Postfix serves as a store-and-forward proxy. This means that it functions as both a server (getting messages from the previous hop) and a client (delivering the non-blocked messages to the next hop).
Because previous and next hops may have different TLS requirements, settings for server and client modes are configured differently.
Client side configuration
This examples assumes that at least some next hops require TLS.
1.
On the protector, open the /etc/postfix/tls_policy file in a text editor.
If the file does not exist, create it.
2.
next.hop.domain encrypt
3.
postmap hash:/etc/postfix/tls_policy
4.
Open the /etc/postfix/main.cf file in a text editor.
5.
relayhost = next.hop.domain ## maintained by management !!!
## certs files
smtp_tls_cert_file=/etc/pki/tls/certs/mydomain.com.cert
smtp_tls_key_file=/etc/pki/tls/private/mydomain.com.key
smtp_tls_CAfile=/etc/pki/tls/cert.pem
## policy map
smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
6.
postfix reload
Notes:
*
*
*
This is the client certificate, not necessarily required by servers.
*
This is the client's private key, sometimes included in client certificate.
*
This is the Certificate Authority (CA) certificate.
The following command was used to create the certificate files in this example:
genkey -days 265 $(hostname)
The genkey utility is a part of crypto utilities package, which is not installed by default and should be installed manually or using yum. To install the package with yum, use the following command:
yum install crypto-utils
If package installation is not an option, it is possible to create certificates using the openssl command:
openssl req -new -nodes -keyout myhost.com.key -out req.pem
In this case, sign "req.pem" with a CA and get in return the "myhost.com.cert" and "cert.pem" files.
Server side configuration
The example assumes that at least some previous hops require TLS:
1.
Open the /etc/postfix/main.cf file in a text editor.
2.
smtpd_tls_cert_file= /opt/websense/PolicyEngine/allcerts.cer
smtpd_tls_key_file= $smtpd_tls_cert_file
smtpd_tls_security_level = may
3.
postfix reload
Notes:
*
*
*
For further details, see: http://www.postfix.org/TLS_README.html and http://www.postfix.org/postconf.5.html.
 
©2018 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners.
 

Go to the table of contents Go to the previous page You are at the end of the document View or print as PDF
Configuring Postfix to Enable Protector TLS Support for Explicit MTA
Copyright 2018 Forcepoint. All rights reserved.