Paul Menzel:
> Dear Postfix users,
> 
> 
> We are using
> 
>      smtp_tls_security_level = dane
>      smtp_tls_policy_maps = hash:/project/mx/etc/tls_policy
> 
> where the file `tls_policy` contains the domains of several research 
> institutions to use the security level `verify` or even `secure`.
> 
> All other TLS connections without DNSSEC/DANE but still a correct 
> certificate setup, that could be verified, are marked as just *Trusted*, 
> as documented in *What do "Anonymous", "Untrusted", etc. in Postfix 
> logging mean?* [1].

Sofar, things work as promised, though not as desired. In for
non-DANE sesions, the TLS level specifies a minumum.

if you don't specify 'verify', then non-DANE sessions are not verified.

> Is there a way to have some verification level `dane-verify-log`, which 
> would, for no "DANE connections", also try to verify the hostname, and log
> 
>      Verified TLS connection established to ...
> 
> if the remote SMTP server's certificate was signed by a CA, trusted
> by the Postfix SMTP client, and the certificate name matches the
> destination or server name(s). Messages would still delivered to
> SMTP servers, where the certificate name does *not* match the
> destination or server name.

Viktor and I have been discussing a design that supports more
than just a minimum level. There may still be time to do this in
the Postfix 3.8 cycle.

But keep in mind that without 'verify' enforcement, a connection
can be downgraded to just the minimum level.

        Wietse

> I think, it would be useful to extract communication partners from the 
> log, where the TLS setup could be improved. Especially, as the GDPR [2] 
> states [3]:
> 
> > Taking into account the state of the art, the costs of implementation
> > and the nature, scope, context and purposes of processing as well as
> > the risk of varying likelihood and severity for the rights and
> > freedoms of natural persons, the controller and the processor shall
> > implement appropriate technical and organisational measures to ensure
> > a level of security appropriate to the risk, including inter alia as
> > appropriate:
> 
> [...]
> 
> > (b) the ability to ensure the ongoing confidentiality, integrity,
> >     availability and resilience of processing systems and services;
> [...]
> 
> So, as end-to-end encryption is not adopted, not verifying the hostname 
> of the SMTP server might be a violation. (Best would be, if everybody 
> would be required to use DNSSEC/DANE, but people might argue it's *Stand 
> von Wissenschaft und Technik*, though at least in Germany, where United 
> Media (Web.de, GMX), mailbox.org, and Posteo use DNSSEC/DANE, at least I 
> would disagree, and call it state of the art.)
> 
> 
> Kind regards,
> 
> Paul
> 
> 
> [1]: https://www.postfix.org/FORWARD_SECRECY_README.html#status
> [2]: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
> [3]: https://gdpr-info.eu/art-32-gdpr/
> 

Reply via email to