Dear Postfix users,

We are using

    smtp_tls_security_level = dane
    smtp_tls_policy_maps = hash:/project/mx/etc/tls_policy

where the file `tls_policy` contains the domains of several research institutions to use the security level `verify` or even `secure`.

All other TLS connections without DNSSEC/DANE but still a correct certificate setup, that could be verified, are marked as just *Trusted*, as documented in *What do "Anonymous", "Untrusted", etc. in Postfix logging mean?* [1].

Is there a way to have some verification level `dane-verify-log`, which would, for no “DANE connections”, also try to verify the hostname, and log

    Verified TLS connection established to …

if the remote SMTP server’s certificate was signed by a CA, trusted by the Postfix SMTP client, and the certificate name matches the destination or server name(s). Messages would still delivered to SMTP servers, where the certificate name does *not* match the destination or server name.

I think, it would be useful to extract communication partners from the log, where the TLS setup could be improved. Especially, as the GDPR [2] states [3]:

Taking into account the state of the art, the costs of implementation
and the nature, scope, context and purposes of processing as well as
the risk of varying likelihood and severity for the rights and
freedoms of natural persons, the controller and the processor shall
implement appropriate technical and organisational measures to ensure
a level of security appropriate to the risk, including inter alia as
appropriate:

[…]

(b) the ability to ensure the ongoing confidentiality, integrity,
    availability and resilience of processing systems and services;
[…]

So, as end-to-end encryption is not adopted, not verifying the hostname of the SMTP server might be a violation. (Best would be, if everybody would be required to use DNSSEC/DANE, but people might argue it’s *Stand von Wissenschaft und Technik*, though at least in Germany, where United Media (Web.de, GMX), mailbox.org, and Posteo use DNSSEC/DANE, at least I would disagree, and call it state of the art.)


Kind regards,

Paul


[1]: https://www.postfix.org/FORWARD_SECRECY_README.html#status
[2]: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
[3]: https://gdpr-info.eu/art-32-gdpr/

Reply via email to