On Wed, Jun 12, 2013 at 03:23:38PM +0200, Jeroen Geilman wrote:

> On 06/12/2013 03:02 PM, Peter Bauer wrote:
> >
> >How can I check the certificate of the incoming email? By
> >fingerprint would be nice. And I would like to refuse it if check
> >fails.
> 
> http://www.postfix.org/TLS_README.html#server_vrfy_client

Also

        http://www.postfix.org/postconf.5.html#check_ccert_access
        http://www.postfix.org/postconf.5.html#reject_plaintext_session

That said, the text below was written around 2005 (for Postfix
2.3), and remains equally applicable today.  The OP's desire to
use TLS fingerprint security for "inbound" mail is largely misguided,
DKIM is likely a better option for message origin authentication
(and even that has limited benefits).  TLS is a hop-by-hop
transmission-channel security mechanism, while origin authentication
is an end-to-end problem.

    http://www.postfix.org/TLS_README.html#client_tls_limits

    ...

    An important SMTP-specific observation is that a public MX host
    is even more at the mercy of the SMTP client than is an HTTPS
    server. Not only can it not enforce due care in the client's
    use of TLS, but it cannot even enforce the use of TLS, because
    TLS support in SMTP clients is still the exception rather than
    the rule. One cannot, in practice, limit access to one's MX
    hosts to just TLS-enabled clients. Such a policy would result
    in a vast reduction in one's ability to communicate by email
    with the world at large.

    One may be tempted to try to enforce TLS for mail from specific
    sending organizations, but this, too, runs into obstacles. One
    such obstacle is that we don't know who is (allegedly) sending
    mail until we see the "MAIL FROM:" SMTP command, and at that
    point, if TLS is not already in use, a potentially sensitive
    sender address (and with SMTP PIPELINING one or more of the
    recipients) has (have) already been leaked in the clear. Another
    obstacle is that mail from the sender to the recipient may be
    forwarded, and the forwarding organization may not have any
    security arrangements with the final destination. Bounces also
    need to be protected. These can only be identified by the IP
    address and HELO name of the connecting client, and it is
    difficult to keep track of all the potential IP addresses or
    HELO names of the outbound email servers of the sending
    organization.

    Consequently, TLS security for mail delivery to public MX hosts
    is almost entirely the client's responsibility. The server is
    largely a passive enabler of TLS security, the rest is up to
    the client.

-- 
        Viktor.

Reply via email to