On 07.01.22 13:28, Viktor Dukhovni wrote:
On Fri, Jan 07, 2022 at 11:34:32AM +0100, Charlotte 🦝 Delenk wrote:

I was trying to harden my postfix configuration and was looking into
making TLS mandatory, as well as verifying the TLS Certificate using
DANE wherever possible.

TLS mandatory for delivery to the world at large?

To the world at large, which I have already been advised against.

 Or is your Postfix
only sending email to a specific set of domains known to support TLS?

The vast majority of domains my server communicates with support TLS 1.3, both as SMTP clients and servers. And those that don't are likely running versions of security-critical libraries and programs that have been superseded upstream for at least 3 years at this point.


When I added DANE support to Postfix in 2013, it seemed unlikely that
there'd be a set of domains small enough to be sure that they all
support STARTTLS and yet too large to explicitly configure some for DANE
and others for mandatory TLS.

Thus, unfortunately, when you specify "dane", in the absence of TLSA
records for the nexthop domain's MX hosts you get "may", rather than
"encrypt".

I think I'm going to stick with "encrypt" for now, as the amount of domains that have deployed DANE are still small (and in fact I have not yet completed the DANE deployment for chir.rs myself)


According to the documentation of smtp_tls_security_level, you can
either set the value to "encrypt" for mandatory tls or "dane" for
optional DANE, but not both.

Correct.

Is there a way to combine "encrypt" with "dane"?

Hypothetically (but not in practice) possible with given a sufficiently
programmable resolver, that reports all domains as signed (validating
those that really are), and can synthesise TLSA records for MX hosts
that lack them, with the synthetic records having an unsupported "usage"
or "selector", in which case Postfix will do mandatory TLS.

I doubt such a resolver is easily available, and it is almost certainly
much easier to patch Postfix to support "encrypt" when "dane" is not an
option.


Yeah, that sounds much more plausible.

--
Charlotte

https://keybase.io/darkkirb • GPG Key 3CEF5DDA915AECB0 • https://darkkirb.de

Attachment: OpenPGP_0x3CEF5DDA915AECB0.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to