J.P. Trosclair wrote, at 03/04/2009 05:01 PM:

> I'll research the smtpd_tls_security_level option further. It didn't
> present a problem until I started working on this specific feature with
> the white lists. I have created another smtpd instance to forward white
> listed domains to rather than trying to utilize the submission port. I
> felt like I was over-complicating (because of archiving with *_bcc_maps
> and duplicate mails) the functionality of the submission service and
> thus headed down a bumpy road, maybe I'm wrong about this though. At the
> same time the submission service seems like the ideal place to hand this
> mail over to for final delivery since it's intended (for us) to allow
> trusted clients to bypass filtering and spam checks.

Yes, it can be. For example, it's perfectly reasonable to include
mynetworks in the submission port's smtpd_client_restrictions, then add
whitelisted hosts to mynetworks. But this is really true only for hosts
under your control, and not recommended for whitelisting whole external
domains. For obvious reasons, it would be insane to add gmail.com to
mynetworks.

Unfortunately, your originally proposed solution weakens security for
all clients using the submission port, including authenticating clients.
A workaround is possible with these settings:

 -o smtpd_tls_security_level=may
 -o smtpd_tls_auth_only=yes

But I would discourage this approach on the public submission port, as
it's best to provide maximum security by encrypting all connections.
When you must relax this restriction, add another port to master.cf that
you can fine-tune for the intended purpose. This also allows you to
apply firewall rules that would be inappropriate for a public submission
service on port 587, enabling you to lock it down tightly.


Reply via email to