On Fri, 2010-09-17 at 11:42 -0400, Victor Duchovni wrote:
> On Thu, Sep 16, 2010 at 03:45:17PM -0500, Vernon A. Fort wrote:
>
> Yes, it looks like that Patch did not make it in.

I just happen to run across your post a few days ago - cleared some
things up but I could NOT find this in the TLS_README.  This would be
helpful information, it was for me.

> I don't read the documentation that way. It does make it clear that for
> a public MX host, anything stronger than "may" is impractical on
> port 25. Also for an internet-facing SMTP client that delivers mail
> to the MX hosts of any and all domains, likewise, "may" is the right
> default policy.
> 
> Beyond that, you can use "secure" channel peer verification by mutual
> agreement with specific destination sites, and that policy is best
> applied by the client.
> 

I fully agree and this IS the way i have it configured - my original
post was poorly written.  Using =may on both in/out but configure
smtp_tls_policy_maps for sites that I need tighter verification.  I'm
playing (for lack of a better term) with the secure settings with two
different destination/sites.  The secure option is easy with sites who
have a purchased certification, a little tougher for ones with
self-signed but it appears doable.

Thanks for all your input and work related to TLS!

Vernon

Reply via email to