-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 14-11-14 22:27, Viktor Dukhovni wrote:
> On Fri, Nov 14, 2014 at 10:01:02PM +0100, Tom Hendrikx wrote:
> 
>> One notable difference between posttls-finger and postfix (as 
>> described in the documentation) is that postfix would only use
>> the TLSA record for deciding on a "verified" connection when the
>> resolver is running on localhost, while posttls-finger also
>> accepts dnssec data from a remote resolver (I run unbound in a
>> different VM on the same piece of hardware).
> 
> Postfix will use (and wisely or otherwise trust) whatever resolver 
> is in /etc/resolv.conf.  If that's remote, and subject to MiTM 
> attacks, that your problem.  If you have a secure IPsec tunnel to a
> trusted resolver, feel free to use it.  You can even use remote 
> resolvers over untrusted networks, and expose yourself to active 
> attacks.
> 
>> My guess is that I would actually need to send a mail to someone
>> that has TLSA records published in order to test my postfix
>> setup, and then check the local logs.
> 
> The posttls-finger and Postfix code exercise very similar
> verification logic.  You can use "sendmail -bv" to test without
> actually delivering the mail.
> 
> /usr/sbin/sendmail -bv postmas...@example.net
> 
> then check the logs.
> 
>> Am I wrong in understanding the docs, or is there actually a 
>> difference in the restrictions on resolver usage between 
>> posttls-finger and postfix. If so, would it be useful to keep
>> these in sync, or add a switch to posttls-finger to enforce this
>> behaviour for testing purposes?
> 
> There is no difference.  Both use the same DNS library in the same 
> way.
> 
>> Finally, does anybody have an email sinkhole available on a DANE 
>> enabled server where I can send some test messages?:)
> 
> The "sendmail -bv" command probes a server without sending mail.
> 

Thanks for the quick responses. That indeed works:

Nov 14 22:55:56 hostname postfix-out/smtp[11505]: Verified TLS
connection established to mail.sys4.de[2001:1578:400:111::7]:25: TLSv1
with cipher ECDHE-RSA-AES256-SHA (256/256 bits)
Nov 14 22:55:57 hostname postfix-out/smtp[11505]: 66FCB8049:
to=<e...@sys4.de>, relay=mail.sys4.de[2001:1578:400:111::7]:25,
delay=0.83, delays=0.16/0.05/0.17/0.45, dsn=2.1.5, status=deliverable
(250 2.1.5 Ok)

Regards,
        Tom
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=X3Z2
-----END PGP SIGNATURE-----

Reply via email to