Paul Menzel: > Dear Postfix users, > > > We are using > > smtp_tls_security_level = dane > smtp_tls_policy_maps = hash:/project/mx/etc/tls_policy > > where the file `tls_policy` contains the domains of several research > institutions to use the security level `verify` or even `secure`. > > All other TLS connections without DNSSEC/DANE but still a correct > certificate setup, that could be verified, are marked as just *Trusted*, > as documented in *What do "Anonymous", "Untrusted", etc. in Postfix > logging mean?* [1].
Sofar, things work as promised, though not as desired. In for non-DANE sesions, the TLS level specifies a minumum. if you don't specify 'verify', then non-DANE sessions are not verified. > Is there a way to have some verification level `dane-verify-log`, which > would, for no "DANE connections", also try to verify the hostname, and log > > Verified TLS connection established to ... > > if the remote SMTP server's certificate was signed by a CA, trusted > by the Postfix SMTP client, and the certificate name matches the > destination or server name(s). Messages would still delivered to > SMTP servers, where the certificate name does *not* match the > destination or server name. Viktor and I have been discussing a design that supports more than just a minimum level. There may still be time to do this in the Postfix 3.8 cycle. But keep in mind that without 'verify' enforcement, a connection can be downgraded to just the minimum level. Wietse > I think, it would be useful to extract communication partners from the > log, where the TLS setup could be improved. Especially, as the GDPR [2] > states [3]: > > > Taking into account the state of the art, the costs of implementation > > and the nature, scope, context and purposes of processing as well as > > the risk of varying likelihood and severity for the rights and > > freedoms of natural persons, the controller and the processor shall > > implement appropriate technical and organisational measures to ensure > > a level of security appropriate to the risk, including inter alia as > > appropriate: > > [...] > > > (b) the ability to ensure the ongoing confidentiality, integrity, > > availability and resilience of processing systems and services; > [...] > > So, as end-to-end encryption is not adopted, not verifying the hostname > of the SMTP server might be a violation. (Best would be, if everybody > would be required to use DNSSEC/DANE, but people might argue it's *Stand > von Wissenschaft und Technik*, though at least in Germany, where United > Media (Web.de, GMX), mailbox.org, and Posteo use DNSSEC/DANE, at least I > would disagree, and call it state of the art.) > > > Kind regards, > > Paul > > > [1]: https://www.postfix.org/FORWARD_SECRECY_README.html#status > [2]: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation > [3]: https://gdpr-info.eu/art-32-gdpr/ >