On Mon, Feb 24, 2014 at 01:16:39AM +0100, Dirk St?cker wrote:

> >SMTP is not HTTP.  Due to MX indirection, peer authentication is
> >not possible without explicit per-destination configuration.  Once
> >you've gone to all that trouble, you may as well configure a "secure"
> >channel.
> 
> I know that there are many side-effects and things which don't work,
> but that does not mean that one can at least try?

Sorry, no half-assed solutions that work only sometimes and break
unpredictably.

> Oh yes - DNSSEC. When will it come? In hundred years?

Available today.  Two of my domains are signed, the third will be
shortly.  And you're complaining about people being complacent and
stuck in the past.

> Can't postfix simply try to detect what level of trust is possible
> and report that?

Without DNSSEC or explicit per-destination peer name match settings, no.

> 1) unencrypted
> 2) encrypted

Postfix already reports these.

> 3) with a known cert

Replace "known" with "valid trust chain", and Postfix logs this as
"Trusted".

> 4) with a trusted cert matching the hostname

This is meaningless.  The MX host is insecure.  Many MX hosts have
certs that don't match their name.

> 5) with a trusted cert matching the hostname + hostname == reverse DNS

This is even more meaningless.

> 6) DNSSEC
> whatever else there is...

Postfix 2.11 supports DANE, DANE actually scales, because policy
for each domain is published by that domain.  DANE removes the
panoply of ~600 widely used CAs from the picture.

If you want secure SMTP transport, direct your efforts at DNSSEC,
and then publish TLSA records for your domain.

-- 
        Viktor.

Reply via email to