On 15/11/2025 05:54, Ömer Güven via Postfix-users wrote:
Hi,

a postfix-tlspol user recently noted unexpected behavior when Postfix (starting with 3.10.5) uses the STS policy attribute /mx_host_pattern/ for MX selection (enabled by default by / smtp_tls_enforce_sts_mx_patterns/ and effective when /QUERYwithTLSRPT/ method of postfix-tlspol is used, regardless of whether TLSRPT is enabled or not).

While reviewing this, I found that postfix-tlspol versions v1.8.15 through v1.8.20 contain a regression introduced during a refactoring change.


*What happened*

postfix-tlspol has produced correct /mx_host_pattern/ attributes for MTA-STS/TLSRPT up to v1.8.14. However, a code refactor in v1.8.15 unintentionally applied a wrong wildcard-normalization logic to these attributes, stripping a leading „***“ from patterns such as „*.example.com“ to „.example.com“ (which is indeed correct, but only in the /match=/ part). The refactor took this step too early in the code.

This went unnoticed earlier because /mx_host_pattern/ was previously used only for TLSRPT reporting. With Postfix 3.10.5+, these patterns are now used directly in the MX-selection path, making correctness essential.


*Impact*
*
*
With Postfix 3.10.5 or later, this can block delivery for domains with MTA-STS policies containing wildcard MX patterns (e. g. outlook.com) when /*QUERYwithTLSRPT*/ method of postfix-tlspol is used instead of / QUERY (former being recommended for Postfix 3.10+)/, *regardless* whether TLSRPT is enabled in Postfix or not.


*Fixed in v1.8.21*

The regression is fixed in postfix-tlspol v1.8.21.

Anyone running Postfix ≥3.10.5 with postfix-tlspol v1.8.15 - v1.8.20 should upgrade to v1.8.21 as soon as possible.
Thanks for the heads up. For those running postfix-tlspol from GhettoForge, I'm building 1.8.21 now.


Peter

_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to