On Sat, Jun 13, 2020 at 08:29:20PM +0200, Ján Máté wrote: > I will report the bug to postfix-mta-sts-resolver developer - the > patch is rather simple: > > root@collegemate:/usr/lib/python3/dist-packages/postfix_mta_sts_resolver# > diff -u responder.py-orig responder.py > --- responder.py-orig 2020-04-11 22:40:55.000000000 +0200 > +++ responder.py 2020-06-13 20:15:00.377112967 +0200 > @@ -219,7 +219,7 @@ > else: > assert cached.pol_body['mx'], "Empty MX list for restrictive > policy!" > mxlist = [mx.lstrip('*') for mx in > set(cached.pol_body['mx'])] > - resp = "OK secure match=" + ":".join(mxlist) > + resp = "OK secure servername=hostname match=" + > ":".join(mxlist) > return netstring.encode(resp.encode('utf-8')) > else: > return netstring.encode(b'NOTFOUND ')
Yes, that should do the trick. > > If the MTA-STS policy table service overrides DANE policy in the > > presence of TLSA records for the domain, then it is broken. If however, > > DANE records are not present, then the MTA-STS service MUST instead > > return one of ... In retrospect my comment doesn't quite apply to the way that MTA-STS is integrated into Postfix. It is either a NOOP or mapped to "strict", so the only downgrade risk is DNSSEC -> WebPKI, and while in my view that's is a downgrade, obtaining unauthorised certs for the target MX is not going to be a common attack vector for most senders to worry about. -- Viktor.