forked from infra/ansible
Fix certificate/CA handling.
This commit is contained in:
parent
ad9f37a966
commit
8d7abb4f0c
@ -6,3 +6,4 @@ ttl_days: 30
|
|||||||
authority: "https://acme-v01.api.letsencrypt.org"
|
authority: "https://acme-v01.api.letsencrypt.org"
|
||||||
|
|
||||||
defaults:
|
defaults:
|
||||||
|
cafile: /etc/acme/lets-encrypt-x3-cross-signed.pem
|
||||||
|
@ -6,22 +6,22 @@
|
|||||||
group: postfix
|
group: postfix
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt
|
format: crt
|
||||||
notify: 'service postfix reload'
|
notify: 'service postfix restart'
|
||||||
- path: /etc/postfix/ssl/{{ mail_server }}.key
|
- path: /etc/postfix/ssl/{{ mail_server }}.key
|
||||||
user: postfix
|
user: postfix
|
||||||
group: postfix
|
group: postfix
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
notify: 'service postfix reload'
|
notify: 'service postfix restart'
|
||||||
- path: /etc/dovecot/ssl/{{ mail_server }}.crt
|
- path: /etc/dovecot/ssl/{{ mail_server }}.crt
|
||||||
user: dovecot
|
user: dovecot
|
||||||
group: dovecot
|
group: dovecot
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt
|
format: crt
|
||||||
notify: 'service dovecot reload'
|
notify: 'service dovecot restart'
|
||||||
- path: /etc/dovecot/ssl/{{ mail_server }}.key
|
- path: /etc/dovecot/ssl/{{ mail_server }}.key
|
||||||
user: dovecot
|
user: dovecot
|
||||||
group: dovecot
|
group: dovecot
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
notify: 'service dovecot reload'
|
notify: 'service dovecot restart'
|
||||||
|
@ -18,7 +18,7 @@ mail_gid = vmail
|
|||||||
ssl = yes
|
ssl = yes
|
||||||
ssl_cert = </etc/dovecot/ssl/{{ mail_server }}.crt
|
ssl_cert = </etc/dovecot/ssl/{{ mail_server }}.crt
|
||||||
ssl_key = </etc/dovecot/ssl/{{ mail_server }}.key
|
ssl_key = </etc/dovecot/ssl/{{ mail_server }}.key
|
||||||
#ssl_ca = TODO
|
ssl_ca = </etc/acme/lets-encrypt-x3-cross-signed.pem
|
||||||
ssl_protocols = !SSLv2 !SSLv3
|
ssl_protocols = !SSLv2 !SSLv3
|
||||||
ssl_cipher_list = ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
|
ssl_cipher_list = ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
|
||||||
|
|
||||||
|
@ -5,11 +5,11 @@
|
|||||||
user: nginx
|
user: nginx
|
||||||
group: nginx
|
group: nginx
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt
|
format: crt,ca
|
||||||
notify: 'service nginx reload'
|
notify: 'service nginx restart'
|
||||||
- path: /etc/nginx/ssl/{{ mailman_domain }}.key
|
- path: /etc/nginx/ssl/{{ mailman_domain }}.key
|
||||||
user: nginx
|
user: nginx
|
||||||
group: nginx
|
group: nginx
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
notify: 'service nginx reload'
|
notify: 'service nginx restart'
|
||||||
|
@ -32,7 +32,7 @@ smtp_tls_loglevel = 2
|
|||||||
|
|
||||||
smtpd_tls_cert_file=/etc/postfix/ssl/{{ mail_server }}.crt
|
smtpd_tls_cert_file=/etc/postfix/ssl/{{ mail_server }}.crt
|
||||||
smtpd_tls_key_file=/etc/postfix/ssl/{{ mail_server }}.key
|
smtpd_tls_key_file=/etc/postfix/ssl/{{ mail_server }}.key
|
||||||
#smtpd_tls_CAfile=TODO
|
smtpd_tls_CAfile=/etc/acme/lets-encrypt-x3-cross-signed.pem
|
||||||
smtpd_use_tls=yes
|
smtpd_use_tls=yes
|
||||||
|
|
||||||
smtpd_tls_ciphers = medium
|
smtpd_tls_ciphers = medium
|
||||||
|
Loading…
Reference in New Issue
Block a user