On Sat, Sep 18, 2021 at 12:44:30AM +0200, Gerald Galster wrote:

> > Sure, but the forensic value of the signal is rather weak, since you
> > learn nothing about the names in the certificate, and anyone can get
> > a certificate from Let's Encrypt.  So your connection was to some
> > server that had some certificate, ... now what?
> 
> You'll get the information that a valid, CA-issued certificate was
> used and you can extract the relay from the maillog.

Yes, but at security level "may" the relay name need not have been any
of the names in the certificate.  At this TLS security level, the
Postfix SMTP client neither knows which name to expect to find, nor
goes to the trouble of looking to see which names if any are present.

So a "Trusted" certificate tells you exceedingly little.

> I'd guess for real mailservers that certificate would verify with the
> mx/relay servername, which could be enforced and monitored.

Which in the absence of DNSSEC is not MiTM-resistant.  The "verify"
security level uses (MX) "hostname" matching by default, and the
documentation warns about the associated security weakness if the
name comes from unsigned DNS.

-- 
    Viktor.

Reply via email to