The only reference google appears to find on this list to MTA-STS indicates 
that folks should use an external MTA-STS
resolver as a part of smtp_tls_policy_maps (the one by Snawoot on GitHub 
appears to be good). Sadly, I don't believe its
possible to properly capture the DANE/MTA-STS interaction using 
smtp_tls_policy_maps - specifically, the MTA-STS RFC states:

   senders who implement MTA-STS validation MUST NOT allow MTA-STS
   Policy validation to override a failing DANE validation.

I read this to imply that a domain with both MTA-STS and DANE must both match 
the DANE certificate fingerprint *and*
have a certificate which is validated by a Certificate Authority for the 
correct hostname(s) per MTA-STS.

This doesn't seem possible with smtp_tls_policy_maps - either you return that a 
domain must be secured by TLS
Certificate Authorities, or you require DANE, but I don't see a way to require 
both.

While you could simply use DANE for such domains as its strictly more secure 
given Certificate Authority policies,
having your MTA-STS resolver calculate DANE policy seems strange, especially 
when it would have to match Postfix's DANE
policy exactly (and avoid any DNS TTL issues whereby the MTA-STS resolver gets 
a different response than Postfix).

Did I miss something? Any chance we could get proper MTA-STS support built into 
Postfix?

Thanks,
Matt

Reply via email to