> Correction:
>
> "smtpd_use_tls = yes" turns on TLS when the remote SMTP client
> sends the STARTTLS command.
>
> This the recommended configuration for MX hosts that also
> must be able to receive plaintext mail.

That makes sense since I did not explicitly set the smtpd_use_tls
setting, something in postfix apparently did it for me.  Many thanks
to you and the other postfix developers for automagically enabling
that setting...

However, my main point of confusion was surrounding the use of
"smtp_tls_security_level", where I believe the documentation says the
default for this setting is 'none'.   I am suggesting the default be
changed from 'none' to 'may' in order to enable opportunistic
encryption.  The docs say postfix will fall back to plaintext so why
not encourage the use of encryption wherever possible (and
automatically choose the better/more secure option similar to what you
do for smtpd_use_tls)?  I suppose setting the option to try encryption
first by default might result in some added overhead on very busy mail
servers, but I expect those server administrators are experts and
aware of the implications (and they would want to use encrypted relays
anyways right?).

If you have good reasons for not changing the default to be more
secure, perhaps adding an additional hint to the documentation might
be the next best thing?  i.e. a FAQ entry stating that users relaying
through a host that supports STARTTLS may want/need to manually change
smtp_tls_security_level to "may" or "encrypt".

Matt

Reply via email to