On 8/24/21 19:23, Viktor Dukhovni wrote:
On 24 Aug 2021, at 7:58 pm, Matt Corallo <ps...@mattcorallo.com> wrote:

May be worth mentioning here that, sadly, Postfix does not support MTA-STS 
currently.

The one implementation at https://github.com/Snawoot/postfix-mta-sts-resolver/ 
will reduce security rather than increase it as dual-MTA-STS-DANE domains start 
to appear[1]. Until then, because MTA-STS is deployed basically just by 
Microsoft and Google, you can accomplish the same result by checking the MX is 
outlook.com or google.com in a tls_policy_maps lookup daemon. By the point 
MTA-STS matters in the slightest, even Microsoft should be enforcing DANE [2] 
so there's probably not use bothering in any case.

[1] https://github.com/Snawoot/postfix-mta-sts-resolver/issues/67
[2] 
https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=&searchterms=dnssec

MTA-STS is not presently worthy of support.  Support is so thin, that
it is far simpler to just enable "secure" delivery to a small handful
of domains (gmail.com primarily), and be done.  The policy can be
periodically updated by querying their MTA-STS record out of band.

The actual protocol is rather a kludge, and I am not inclined to write
code to support it.

Excuse me, I didn't mean to imply otherwise. The protocol is so comically stupid that it could only possibly have come from a group still clinging to the idea that SSL certificates are somehow magically more trustworthy than the DNS information that they use for their only source of truth, ignoring all practical experience from many years of deployment.

I was only noting that, for those who read the above and googled "postfix mta-sts", they should *avoid* running the one result they find as it likely works well but breaks DANE, at least for the domains that will presumably eventually use both DANE and MTA-STS.

Reply via email to