Am Freitag, 22. November 2019, 23:08:39 CET schrieb Ralph Seichter:
> * Lars Kollstedt:
> > is there a clean way to optionally present a client certificate to a
> > Postfix MX [...]
> 
> I hope I don't misinterpret your question here. 
[...]
> However, I don't see you using relay_clientcerts=/path/to/clientcerts
> anywhere. That would be required on the SMTP server side to actually
> look up certificate fingerprints.


Hi Ralph,

at first thank you for the reply.

But I'm not talking about doing relay control via client certificates. This is 
just a setup I know and I don't want to break, if someone does it on the same 
host and port as his MX.

We've someone running 

smtpd_tls_received_header=yes
smtpd_tls_ask_ccert = yes
smtpd_tls_CApath=/etc/ssl/certs

on his Postfix MX servers in our nearer environment, but I don't want to 
maintain a list of all his domains to present the client certificate there. 

But I understand the wish to also cryptographically verify this direction. So 
I would like to make his servers logging the verification of the client 
certificate "I've crypographically sure got the mail from that host."


At the moment it's a single MX server name on the other end but a bunch of 
domains. And since the transport map is working on domain names prior of the 
MX lookup (at least as far as I know) this is not an option.

Something mapping the transport method the after MX lookup was done would  
solve this, for my current usecase. With the single server configured this way 
on the other end.


But it's of course not worth breaking the mail delivery or TLS to other mail 
recipients where relay control is done this way on port 25 of the MX server, 
in a way that causes problems if an unexpected client certificate is 
presented.

So the question was if there is a clean way, to configure a client certficate 
that is tried to present, and left away in case of failure. Unfortunately this 
will need a second connection, when tried without the other side to signal 
what kind of verification is done. And it's not possible to determine the 
reason of failure, that's the reason of my worries about greylisting.

The more I'm thinking about this seems to be more a protocol extension for 
future but anything that can be implemented by configuration - without 
breaking anything, yet.

Kind regards,
        Lars

-- 
Lars Kollstedt

Telefon: +49 6151 16-71027
E-Mail:  l...@man-da.de

man-da.de GmbH
Dolivostraße 11
64293 Darmstadt

Sitz der Gesellschaft: Darmstadt
Amtsgericht Darmstadt, HRB 9484
Geschäftsführer: Andreas Ebert


Reply via email to