I think that the mistake was to make smtp_tls_dane_insecure_mx_policy
dependent on smtp_tls_security_level

Will it please Viktor and Omer if I change the default to 

    smtp_tls_dane_insecure_mx_policy = dane

That seems to have less of a WTF factor.

Here is my motivation to make make dane policy evaluation NOT
dependent on smtp_tls_security_level.

In today's world it seems natural, to me at least, to set
smtp_tls_security_level to 'may' as a default baseline for all
deliveries, and then use policy lookup for sites that are ready for
stronger security.

    For this reason alone, smtp_tls_security_level is not a good
    way to express how to handle a DANE half-edge case.

    Asking people to configure different transports for this case,
    kind of defeats the purpose of having smtp_tls_policy_maps.

    Thus, I propose to decouple smtp_tls_dane_insecure_mx_policy
    from smtp_tls_security_level

Starting with today's baseline level of 'may', Over time one can
evolve the baseline to 'encrypt', and eventually use 'secure' as
the baseline, and (NOTE: role switch!) use samtp_tls_policy_maps
for sites that need weaker security.

So there is my longer-term perspective: today, use policy maps to
harden security for specific sites. In the future, use use policy
maps to weaken security for specific sites.

Decoupling smtp_tls_dane_insecure_mx_policy from smtp_tls_security_level
will delay the Postfix 3.10.0 stable release by another day, but it
would be worth it.

        Wietse
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to