----- Message from Joachim Lindenberg <postfix-us...@lindenberg.one> ---------
   Date: Fri, 26 Aug 2022 17:00:32 +0200
   From: Joachim Lindenberg <postfix-us...@lindenberg.one>
Subject: AW: MTA-STS implementation
     To: postfix-users@postfix.org


I definitely suggest to look into RFC 7672 SMTP-DANE instead of MTA-STS. SMTP-DANE is more secure than MTA-STS, and in my "samples" also more widely adopted than MTA-STS. In my view, MTA-STS is only interesting if you do not want to adopt DNSSEC. Postfix supports DANE out of the box, but you have to use a DNSSEC aware resolver and configure appropriately.
Best Regards, Joachim

-----Ursprüngliche Nachricht-----
Von: owner-postfix-us...@postfix.org <owner-postfix-us...@postfix.org> Im Auftrag von post...@ptld.com
Gesendet: Freitag, 26. August 2022 16:24
An: postfix-users@postfix.org
Betreff: Re: MTA-STS implementation

On 08-26-2022 10:08 am, Paul Kingsnorth wrote:
MTA-STS seems to be getting more widespread. I wondered how many people are using the postfix-mta-sts-resolver from Snawoot, and whether there are any standout good/bad features of it? Or whether there are any other ways of implementing MTA-STS with postfix?


Wouldn't setting smtpd_tls_security_level=encrypt have the same desired effect of what MTA-STS is trying to solve? Granted you would be preventing other MTA's from delivering if they aren't using STARTTLS.
Or is there more going on with MTA-STS then what I understand?


----- End message from Joachim Lindenberg <postfix-us...@lindenberg.one> -----

Wouldn't setting smtpd_tls_security_level=encrypt have the same desired effect of what MTA-STS is trying to solve?

Quick comment on the above point: Setting up MTA-STS in DNS to allow for MTA-STS validation on your domain does not result in you not being able to receive non-encrypted inbound email, so it is not the same as setting smtpd_tls_security_level=encrypt (which according to postfix documentation is not recommended on publicly facing SMTP servers).


MTA-STS has been getting traction... Google appear to be going all-in, although noting from my reading on the subject that as above DANE appears to be superior, e.g. [1] from Viktor.

I'm in the process of adding the DNS settings and required 'bits' to allow *inbound* MTA-STS validation on my primary email domain to make it available to e.g. Google; currently it's in 'testing' mode. However based on my reading I'm not changing Postfix to alter my outbound mail process, which is based around:

 smtp_tls_security_level       = dane
 smtp_dns_support_level        = dnssec

It appears, again from my reading and I am sure others with better knowledge will add more, that currently setting postfix to use 'outbound' MTA-STS validation means emails being sent to domains that have validation of both DANE and MTA-STS (like mine) may end up with the sending server using MTA-STS and overriding a failing DANE validation, which is not what the RFC [2] requires: "senders who implement MTA-STS validation MUST NOT allow MTA-STS Policy validation to override a failing DANE validation". See discussion at [3].

So for now, for my very low volume personal domain/server, I'm working to offer TLS validation inbound for DANE and MTA-STS but am not changing Postfix config from DANE/DNSSEC, thus retaining DANE only for outbound.

If that is not a recommended approach I'd be very welcoming of other suggestions BTW...

Simon


[1] https://www.isi.edu/~hardaker/news/2021-09-20-DANE-vs-STS.html
[2] https://datatracker.ietf.org/doc/html/rfc8461#section-2
[3] https://serverfault.com/questions/1101533/is-it-possible-to-use-mta-sts-in-postfix-without-overriding-dane


--
Simon Wilson
M: 0400 12 11 16

Reply via email to