Wietse wrote:
>> Given the fact that "encrypt" implies no "dane" this sounds like a bad idea 
>> for interoperability with dane sites.
> No problem. Postfix currently does not try DANE (or STS) with the default TLS 
> security level "may".
Correct. But would you then ignore the suggested _smtps.example.dom setting 
with "dane", "dane-only", "secure", or "verify" TLS security level? Or what 
would be the semantics in any of these? Would one assume the same certificate 
to be used with STARTTLS or implied TLS?
 
>> All in all, imho interoperability with RFC 7672 and RFC 8461 are not 
>> addressed sufficiently yet.
> Can you be more specific? I think it does not interfere with either DANE or 
> STS.
Maybe not conceptually, but implementation wise there could be more 
clarification. E.g. would one first obtain _smtps.example.doc for the port to 
use (fallback 25), and then search for TLSA records 
_<port>._tcp.<mx.example.dom> to check for dane as well? Would one prefer not 
to optimize the connection in case there are no TLSA records on the specified 
port but there are any for _25._tcp.<mx.example.dom> ?
To some extend the approach probably replaces blocking calls on TCP layer with 
blocking calls on DNS. If we see DNS also moving to TLS (I am aware of there is 
right now no standard how to use any of Do* with authoritative DNS servers, but 
that might change as well), then there is probably little gain unless caching 
plays a significant role, which likely depends a lot on the load of the mail 
server.

Joachim






_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to