Florian Weimer:
> > My patch does not make security any worse than it was prior to
> > GLIBC 2.31. This is all I can do for stable Postfix releases:
> > ensure that shit does not stop working after an OS update.
> >
> > Any 'improvements' in Postfix DNSSEC support will have to be developed
> > in the Postfix 3.6 release cycle. The results from those 'improvements'
> > will never be merged back into Postfix 3.5 and earlier.
> 
> I'm trying to understand why you were trusting the AD bit.  Is it

Because Postfix DANE support requires a trusted resolver that returns
the AD after successful DNSSEC validation. We have documentation that
recommends using a local resolver. However, if people want to shoot
themselves in the foot, then Postfix won't stop them.

By unconditionally setting the AD bit in a DNS query, we avoid a
breaking change, and we are not making things worse than they were
with glibc 2.19. If Postfix stable release behavior is a gaping
security hole, pLEASE SAY SO.

Best practices evolve and security can always be improved, but such
incremental improvements belong in an UNSTABLE release, not in a
STABLE release, because improvements often introduce incompatibility.

        Wietse

Reply via email to