> On Aug 22, 2017, at 12:08 PM, yodel...@yepmail.net wrote:
> 
> Is there an inbound  per-domain TLS policy map?

http://www.postfix.org/TLS_README.html#client_tls_limits

One may be tempted to try enforcing TLS for mail from specific sending 
organizations, but this, too, runs into obstacles. One such obstacle is that we 
don't know who is (allegedly) sending mail until we see the "MAIL FROM:" SMTP 
command, and at that point, if TLS is not already in use, a potentially 
sensitive sender address (and with SMTP PIPELINING one or more of the 
recipients) has (have) already been leaked in the clear. Another obstacle is 
that mail from the sender to the recipient may be forwarded, and the forwarding 
organization may not have any security arrangements with the final destination. 
Bounces also need to be protected. These can only be identified by the IP 
address and HELO name of the connecting client, and it is difficult to keep 
track of all the potential IP addresses or HELO names of the outbound email 
servers of the sending organization.

Consequently, TLS security for mail delivery to public MX hosts is almost 
entirely the client's responsibility. The server is largely a passive enabler 
of TLS security, the rest is up to the client. While the server has a greater 
opportunity to mandate client security policy when it is a dedicated MSA that 
only handles outbound mail from trusted clients, below we focus on the client 
security policy.

> Are they named differently, or not available because of the way the handshake 
> happens?

See above.

-- 
        Viktor.

Reply via email to