On Fri, Nov 14, 2014 at 10:01:02PM +0100, Tom Hendrikx wrote:

> One notable difference between posttls-finger and postfix (as
> described in the documentation) is that postfix would only use the
> TLSA record for deciding on a "verified" connection when the resolver
> is running on localhost, while posttls-finger also accepts dnssec data
> from a remote resolver (I run unbound in a different VM on the same
> piece of hardware).

Postfix will use (and wisely or otherwise trust) whatever resolver
is in /etc/resolv.conf.  If that's remote, and subject to MiTM
attacks, that your problem.  If you have a secure IPsec tunnel to
a trusted resolver, feel free to use it.  You can even use remote
resolvers over untrusted networks, and expose yourself to active
attacks.

> My guess is that I would actually need to send a mail to someone that
> has TLSA records published in order to test my postfix setup, and then
> check the local logs.

The posttls-finger and Postfix code exercise very similar verification
logic.  You can use "sendmail -bv" to test without actually delivering
the mail.

        /usr/sbin/sendmail -bv postmas...@example.net

then check the logs.

> Am I wrong in understanding the docs, or is there actually a
> difference in the restrictions on resolver usage between
> posttls-finger and postfix. If so, would it be useful to keep these in
> sync, or add a switch to posttls-finger to enforce this behaviour for
> testing purposes?

There is no difference.  Both use the same DNS library in the same
way.

> Finally, does anybody have an email sinkhole available on a DANE
> enabled server where I can send some test messages?:)

The "sendmail -bv" command probes a server without sending mail.

-- 
        Viktor.

Reply via email to