On Tue, Jun 09, 2015 at 07:37:54PM -0700, PGNd wrote:

> A simpler alternative for my case may be
> 
>                 -o smtp_tls_CAfile=/etc/ssl/mail/DDDD_CA.crt
>                 -o smtp_tls_cert_file=/etc/ssl/mail/relay-remote.crt
> +               -o smtp_tls_fingerprint_cert_match=$var_FP01
>                 -o smtp_tls_key_file=/etc/ssl/mail/relay-remote.key
> -               -o smtp_tls_policy_maps=lmdb:/etc/postfix/tls_policy
> -               -o smtp_tls_security_level=secure
> +               -o smtp_tls_security_level=fingerprint
>                 -o tls_append_default_CA=no
> 
> which returns in log
> 
>       Jun  9 19:27:30 remote016 postfix/relay-remote/smtp[25329]: Verified 
> TLS connection established to internal.local010.DDDD.com[10.128.1.10]:11587: 
> TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
> 
> with a Verified TLS connection

If you control both ends, and are willing to maintain synchronization
between client configuration and server certificate, this is more secure
than using a CA.  Prior to installing a new server certificate, configure
the client with both fingerprints (current and planned).

This requires some operational discipline, but avoids trusting third
parties.

> Is 'Verified' here equivalent to your 'authenication' advice?

Yes.

> In this fingerprint mode, if the FP is un-matcched, the send is deferred.  
> Does that deferral constitute sufficient 'refusal to proceed'?

Yes.

-- 
        Viktor.

Reply via email to