On Tue, Aug 24, 2010 at 10:29:43AM -0500, Noel Jones wrote:

> On 8/24/2010 10:24 AM, Vernon A. Fort wrote:
>> We have a few companies that we need have ALL email traffic encrypted.
>> We can no longer 'blindly trust' the end user to not include sensitive
>> information in email.  A VPN would be a easier solution but its not an
>> option at this point.
>>
>> So, the outbound appears to be simple:
>>
>>      smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
>> with
>>      domain.com      encrypt
>>      .domain.com     encrypt
>>
>> basically, if the email is destine for THIS (or these) domain(s),
>> enforce encryption.  If we cannot, immediately return the email.
>>
>> But how to i enforce email connections FROM specific sites (ip's) to be
>> encrypted, i.e. reject_if_NOT_tls_connection?
>>
>> Vernon
>
> http://www.postfix.org/postconf.5.html#reject_plaintext_session
>
> abbreviated example of selective usage:
>
> smtpd_sender_restrictions =
>   check_client_access cidr:/path/force_tls
>
> # force_tls
> 5.4.3.2/32  reject_plaintext_session

See however,

    http://www.postfix.org/TLS_README.html#client_tls_limits

the responsibility to encrypt falls largely on the sender. I would
encourage you to work with the peer organization to have them encrypt
traffic to your domains. Tracking their sending IPs scales poorly.

-- 
        Viktor.

Reply via email to