On Fri, Sep 20, 2013 at 09:27:57AM -0500, Noel Jones wrote:

> Without close cooperation from the remote site, fingerprint
> verification just isn't practical. For an arbitrary third-party
> site, you'll probably need to stick to "encrypt" or maybe in some
> cases "verify".
> http://www.postfix.org/TLS_README.html#client_tls

One should generally use "secure", not "verify".  It was mistake
on my part to create both security levels, they differ only in the
default matching strategy.  We should have had a single level with
a configurable global matching strategy (smtp_tls_verify_cert_match)
that defaults safe, and with the per-site "match" overrides allowing
users to fine-tune as necessary.

Instead we have "verify" and "secure' that differ only in the unsafe
setting of smtp_tls_verify_cert_match vs. a safe setting for the
analogous smtp_tls_secure_cert_match.

Users should probably set:

        # Default MITM safe matching (as in "secure")
        smtp_tls_verify_cert_match = nexthop, dot-nexthop
        smtp_tls_secure_cert_match = nexthop, dot-nexthop

        # Default MITM unsafe matching (as in "verify")
        smtp_tls_verify_cert_match = hostname
        smtp_tls_secure_cert_match = hostname

and then use the two levels interchangeably.

[ Don't try to alias one in terms of the implicit default value of
  the other, Postfix configuration parameter expansion happens
  incrementally, and the defaults are not all set when parameters
  are expanded. ]

> Hopefully widespread DANE adoption will take the pain out of this
> in the future.

Amen.

-- 
        Viktor.

Reply via email to