On Wed, Oct 23, 2024 at 07:15:31PM +0800, Wesley via Postfix-users wrote:

> please see this default value,
> 
> # postconf -d smtp_tls_security_level
> smtp_tls_security_level =

The default value maintains backwards-compatibility with Postfix ~2.2
when TLS support was first merged into Postfix based on original patches
by Lutz Jänicke.  At the time TLS client security was defined by
separate boolean parameters:

    smtp_use_tls
    smtp_enforce_tls
    smtp_tls_enforce_peername

These separate parameters were subsumed by the single

    smtp_tls_security_level

and are now obsolete, but the default behaviour is to honour these
legacy parameters, when their replacement is not explicitly specified.

> does this mean if using the default value, Postfix will deliver
> messages to peer MTA without using ssl/tls always, even the peer
> supports encryption connection?

No, see above.  But note that with opportunistic TLS, i.e. either of:

    - smtp_use_tls = yes
      smtp_enforce_tls = no

    - smtp_security_level = may

Postfix will fall back to cleartext transmission when either the remote
server does not offer STARTTLS, or when STARTTLS fails to be negotiated
(by default once a message has been in the queue for a minimum time).

If you really want mandatory TLS, and can afford to not be able to send
email to non-TLS peers, then you'd need at least:

    smtpd_tls_security_level = encrypt

What's still missing is a way to specify "encrypt" as a minimum fallback
from "dane", when the remote MX host does not have DNSSEC signed TLSA
records.  This requires some spare cycles to implement.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to