On Sat, Jul 04, 2020 at 01:54:14PM -0400, Matt Corallo wrote:

> The only reference google appears to find on this list to MTA-STS indicates 
> that folks should use an external MTA-STS
> resolver as a part of smtp_tls_policy_maps (the one by Snawoot on GitHub 
> appears to be good). Sadly, I don't believe its
> possible to properly capture the DANE/MTA-STS interaction using 
> smtp_tls_policy_maps - specifically, the MTA-STS RFC states:
> 
>    senders who implement MTA-STS validation MUST NOT allow MTA-STS
>    Policy validation to override a failing DANE validation.

Yes, but for now, with deployment of both rather thin, and the
intersection practically empty, it is OK to accept MTA-STS success even
if perhaps the DANE policy would have failed.

> This doesn't seem possible with smtp_tls_policy_maps - either you
> return that a domain must be secured by TLS Certificate Authorities,
> or you require DANE, but I don't see a way to require both.

Yes, there is no mechanism to validate both, or to have existence of
TLSA records suppress the MTA-STS resolver policy.

> Did I miss something? Any chance we could get proper MTA-STS support
> built into Postfix?

Probably not this year.  I'll be more motivated when I see Google
supporting DANE outbound. Also at least inbound on mx[1-4].smtp.goog,
which are already signed, thus not publishing the associated TLSA RRs
smacks of negligence to me.

-- 
    Viktor.

Reply via email to