On Thu, Sep 10, 2015 at 07:44:19PM +0200, Michael Ströder wrote:

> Looking at [1] it's not clear to me whether it's possible to require MX RRs of
> a recipient domain to be DNSSEC signed. Any other configuration option for 
> that?

Postfix, at present, does not support requiring a DNSSEC-signed MX
RRset, except as part of a "dane-only" security level, which also
requires that the A/AAAA records of at least one MX host are signed
and that MX host has correct TLSA records.

> [1] http://www.postfix.org/postconf.5.html#smtp_tls_policy_maps

Policy requiring DNSSEC signed MX RRsets could well apply even for
domains with which TLS is not used, this is not directly related
to TLS authentication.

Of course such a policy might allow the "verify" security level to
apply Web PKI PKIX authentication to a verifed MX host name.  Still
if the domain ever does change their MX records, you might well
find that the peer certificate is now self-signed, or no longer
matches the MX hostname, ... So this would have to be used with care.

I gather you're looking for something like:

    example.com secure match=nexthop:dot-nexthop:hostname dnssec=yes

where "dnssec=yes" would be a new policy option, that requires a
"secure" MX RRset, or "secure" absence of an MX host.

-- 
        Viktor.

Reply via email to