配置Postfix(SMTP)支持SSL
安装OpenSSL-Perl
yum install -y openssl-perl
会在/etc/pki/tls/misc/目录下生成CA.pl脚本,让你可以自己开设 CA,自己签署自己的证书。
生成服务器根证书
# cd /etc/pki/tls/misc/
# ./CA -newca
CA certificate filename (or enter to create)      #按回车开始
#在下面的设置过程中,输错了可以按ctrl+backspce进行删除
Making CA certificate ...
Generating a 2048 bit RSA private key
..............................+++
................+++
writing new private key to ‘/etc/pki/CA/private/cakey.pem‘
Enter PEM pass phrase:123456                      #输入密码,至少4个字符
Verifying - Enter PEM pass phrase:123456          #重复输入密码
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter ‘.‘, the field will be left blank.
-----
Country Name (2 letter code) [XX]:CN                #输入国家
State or Province Name (full name) []:Guangdong     #输入省份
Locality Name (eg, city) [Default City]:Guangzhou   #输入城市
Organization Name (eg, company) [Default Company Ltd]:gzydt  #输入公司名
Organizational Unit Name (eg, section) []:tect      #输入部门名
Common Name (eg, your name or your server s hostname) []:admin   #输入你的名字或服务器名
Email Address []:                                  #输入邮箱账号(可不填)
Please enter the following ‘extra‘ attributes
to be sent with your certificate request
A challenge password []:                           #输入证书请求密码(可不填)
An optional company name []:                       #输入可选公司名(可不填)
Using configuration from /etc/pki/tls/openssl.cnf
Enter pass phrase for /etc/pki/CA/private/cakey.pem:123456 #输入前面设的密码123456
Check that the request matches the signature
Signature ok
Certificate Details:
        Serial Number: 14986867786496351857 (0xcffc0cd915dc1e71)
        Validity
            Not Before: Nov 28 02:06:59 2014 GMT
            Not After : Nov 27 02:06:59 2017 GMT
        Subject:
            countryName               = CN
            stateOrProvinceName       = zhejiang
            organizationName          = yourmail
            organizationalUnitName    = it
            commonName                = root
        X509v3 extensions:
            X509v3 Subject Key Identifier: 
                12:6E:1A:A9:98:79:E1:A6:82:7E:A4:D8:FD:44:5D:57:FF:4B:46:69
            X509v3 Authority Key Identifier: 
                keyid:12:6E:1A:A9:98:79:E1:A6:82:7E:A4:D8:FD:44:5D:57:FF:4B:46:69
            X509v3 Basic Constraints: 
                CA:TRUE
Certificate is to be certified until Nov 27 02:06:59 2017 GMT (1095 days)
Write out database with 1 new entries
Data Base Updated
说明:显示上面资料表示成功,否则失败;失败时删除cakey.pem后重新执行CA
# rm -f /etc/pki/CA/private/cakey.pem 
# cd /etc/pki/tls/misc/
# ./CA -newca
创建证书目录,将生成的根证书复制进去
# mkdir /etc/pki/myca
# cp /etc/pki/CA/cacert.pem /etc/pki/myca
生成私钥和CSR证书签署请求文件
# cd /etc/pki/myca
# openssl req -new -nodes -keyout mailkey.pem -out mailreq.pem -days 3650
Generating a 2048 bit RSA private key
...................................+++
....................+++
writing new private key to ‘mailkey.pem‘
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter ‘.‘, the field will be left blank.
-----
Country Name (2 letter code) [XX]:CN
State or Province Name (full name) []:Guangdong
Locality Name (eg, city) [Default City]:Guangzhou
Organization Name (eg, company) [Default Company Ltd]:gzydt
Organizational Unit Name (eg, section) []:tech
Common Name (eg, your name or your server s hostname) []:admin
Email Address []:                                   # 不填,直接回车
Please enter the following ‘extra‘ attributes
to be sent with your certificate request
A challenge password []:                            # 不填,直接回车
An optional company name []:                        # 不填,直接回车
参数说明
- -new表示你想产生公私钥与CSR
 - -nodes表示不加密
 - -keyout指出私钥文件
 - -out指出CSR文件的名称
 - -days指出证书的有效期限是10年
 
查看生成的文件:
# cd /etc/pki/myca
# ll
总用量 16
-rw-r--r--. 1 root root 4291 12月  2 14:08 cacert.pem  #根证书
-rw-r--r--. 1 root root 1704 12月  2 14:09 mailkey.pem #私钥
-rw-r--r--. 1 root root  997 12月  2 14:09 mailreq.pem #CSR文件
签署CSR文件
# cd /etc/pki/myca
# openssl ca -out mailcert.pem -infiles mailreq.pem
...
failed to update database
TXT_DB error number 2
产生的原因是:证书的设置相同,导致subject值相同
解决方法:
将“唯一主题”设置为不必须:# vim /etc/pki/CA/index.txt.attr
unique_subject = no   # yes改为no
再次执行:openssl ca -out mailcert.pem -infiles mailreq.pem
查看生成文件:ll /etc/pki/myca
-rw-r--r--. 1 root root 4291 12月  2 14:08 cacert.pem   #根证书
-rw-r--r--. 1 root root 4430 12月  2 14:11 mailcert.pem #公钥
-r--------. 1 root root 1704 12月  2 14:09 mailkey.pem  #私钥
-rw-r--r--. 1 root root  997 12月  2 14:09 mailreq.pem  #CSR文件
配置postfix
添加main.cf配置
#vim /etc/postfix/main.cf
在末尾加入下面配置
# Postfix作为SMTP服务端的TLS配置
smtpd_use_tls = yes
smtpd_tls_key_file = /etc/pki/myca/mailkey.pem
smtpd_tls_cert_file = /etc/pki/myca/mailcert.pem
smtpd_tls_CAfile = /etc/pki/myca/cacert.pem
# smtpd_tls_security_level = encrypt
# 表示强制使用TLS加密,不建议,会导致丢失courier-authlib认证
smtpd_tls_security_level = may
smtpd_tls_received_header = yes
smtpd_enforce_tls = yes
smtpd_tls_loglevel = 2
# Postfix作为SMTP客户端的TLS配置
smtp_use_tls = yes
smtp_tls_key_file = /etc/pki/myca/mailkey.pem
smtp_tls_cert_file = /etc/pki/myca/mailcert.pem
smtp_tls_CAfile = /etc/pki/myca/cacert.pem
#smtp_tls_policy_maps = hash:/etc/postfix/tls_policy_maps
#TLS限制策略,有需要的百度下如何设置
开启smtps
#vim /etc/postfix/master.cf
打开下面的注释
smtps    inet    n    -    n    -    -    smtpd
  -o smtpd_tls_wrappermode=yes 
  -o smtpd_sasl_auth_enable=yes
重新加载postfix并查看结果
# service postfix reload
# netstat -tnlp|grep 465
tcp        0      0 0.0.0.0:465                 0.0.0.0:*                   LISTEN      64222/master        
tcp        0      0 :::465                      :::*                        LISTEN      64222/master
注意防火墙
根据自身系统,添加放行规则
检查当前smtp是否支持TLS
使用telnet命令,访问25端口
# telnet localhsot 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
220 mail.某域名.com ESMTP Jobkoo mail system (version:1.0)
ehlo mail.xxx.com          # 这里随便输入欢迎语
250-mail.某域名.cn
250-PIPELINING
250-SIZE 20000000
250-VRFY
250-ETRN
250-STARTTLS                # 这里很关键
250-AUTH PLAIN LOGIN        # 如果没有出现这两行
250-AUTH=PLAIN LOGIN        # 修改smtpd_tls_security_level = may不强制使用TLS
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
starttls                    # 输入TLS命令
220 2.0.0 Ready to start TLS# 出现这行表示成功
如上面的output,若是有STARTTLS,则说明postfix支持TLS,否则可能需要重装。
↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ 重装请看分割线以下的内容 ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓
使用源码安装
源码可以自行百度Postfix下载,版本均可
解压之后,执行如下命令:
make makefiles 'CCARGS=-DHAS_MYSQL -I/usr/local/mysql/include/mysql -DUSE_SASL_AUTH -DUSE_CYRUS_SASL -I/usr/local/include/sasl  -DUSE_TLS ' 'AUXLIBS=-L/usr/local/mysql/lib -lmysqlclient -lz -lm -L/usr/lib/sasl2 -lsasl2  -lssl -lcrypto'
释义
- CCARGS:指明头文件位置
 - -DHAS_MYSQL:指定启用mysql的连接能
 - -I/usr/local/mysql/include/mysql:指定mysql的头文件位置
 - -DUSE_SASL_AUTH启用SASL认证
 - -I/usr/local/include/sasl:指定SASL头文件位置
 - -DUSE_TLS:使SMTP支持smtps协议(就是缺少这个)
 - AUXLIBS:指定库文件位置
 - -L/usr/local/mysql/lib:指定MySQL库文件位置
 - -lmysqlclient:指定MySQL客户端库文件
 - -lz:压缩库文件
 - -lm:模块库文件
 - -lssl:ssl的库文件
 
接着执行:make && make install
若编译失败,尝试安装一下lib:
yum -y install openssl-devel
yum install db*-devel