Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
And how is your Postfix configured exactly, with regard to the certificate?
(I believe current versions of Postfix reload the updated certificate automatically, but I'm not sure since when and if it always does this. It might need inotify stuff or something, I dunno..)
@orangepizza yes, I reload even reboot the server twice. @Osiris I setup using iRedMail from Jan or Feb, and its working well since.
The problem arise since 3rd April until today I made this post.
However, I just found out the solution. After I read the log again, more closely, I found one warning:
warning: database /etc/postfix/vmail_ssl.map.db is older than source file /etc/postfix/vmail_ssl.map
I perform the postmap -F hash and restart the postfix, and all work normally again.
I am not sure, do I need to perform that task at certain time? Is that has expiration date or else?
I use SSL for each domain name I have on the postfix config file under tls_server_sni_maps
While I'm running Postfix myself, I don't use vmail (my Postfix has just a single certificate, so no mapping necessary). But I'm guessing you might need to rehash that mapping after every renewal? I'm not sure.. You might want to look into the --deploy-hook Certbot option to script something for this.
I will wait for another renew process and see what happen later.
I already use the pre and post hook method when renew certificates.
Thanks for the tip.
Technically, mine has one RSA and one EC, but they cover they same hostname. I may be able to drop the RSA cert, as I think Proofpoint finally upgraded their systems to handle EC certificates, but there is no real urgency.
The rehash of that map needs to occur any time it is modified. That should be detected by Postfix automatically. Postfix should be reloaded any time a certificate it uses is replaced. Using a deploy-hook (not a post-hook) is the best way to make that happen.