On Tue, 2010-08-24 at 10:29 -0500, Noel Jones wrote:
> On 8/24/2010 10:24 AM, Vernon A. Fort wrote:
> > We have a few companies that we need have ALL email traffic encrypted.
> > We can no longer 'blindly trust' the end user to not include sensitive
> > information in email.  A VPN would be a easier solution but its not an
> > option at this point.
> >
> > So, the outbound appears to be simple:
> >
> >     smtp_tls_policy_maps = hash:/etc/postfix/tls_policy
> > with
> >     domain.com      encrypt
> >     .domain.com     encrypt
> >
> > basically, if the email is destine for THIS (or these) domain(s),
> > enforce encryption.  If we cannot, immediately return the email.
> >
> > But how to i enforce email connections FROM specific sites (ip's) to be
> > encrypted, i.e. reject_if_NOT_tls_connection?
> >
> > Vernon
> >
> 
> 
> http://www.postfix.org/postconf.5.html#reject_plaintext_session
> 
> 
> abbreviated example of selective usage:
> 
> smtpd_sender_restrictions =
>    check_client_access cidr:/path/force_tls
> 
> 
> # force_tls
> 5.4.3.2/32  reject_plaintext_session

Thanks Noel - would this work with a domain configuration, like
        smtpd_sender_restrictions =
                check_client_access hash:/etc/postfix/force_tls

        # force_tls
        domain.com      reject_plaintext_session

Meaning I do NOT accept email from domain.com thats not encrypted.  The
cidr approach may be the best solution - just exploring my options.
Again, just seeing if there is a way to ENSURE/VALIDATE the other side
is doing what they said they would do.

Vernon

Reply via email to