A more quick and dirty option is to configure transport policy "verify" for any 
mta-sts destinations (I am doing this in a script).
That doesn´t really check the mx one connects to are enumerated, but at least 
the certificate validation part of mta-sts will prevent connections to 
arbitrary unauthenticated hosts.
Cheers,
Joachim

-----Ursprüngliche Nachricht-----
Von: Viktor Dukhovni via Postfix-users <postfix-users@postfix.org> 
Gesendet: Mittwoch, 24. Mai 2023 14:32
An: postfix-users@postfix.org
Betreff: [pfx] Re: TLS client policy according to domain MTA-STS policy

On Wed, May 24, 2023 at 02:25:38PM +0200, Paul Menzel via Postfix-users wrote:

> Running the *Public Email & DNS Testbed* [1], I was reminded, that we 
> have MTA-STS set up, but do not take the MTAT-STS policy of other 
> domains into account.
> 
> As a solution I found *postfix-mta-sts-resolver* [2], which warns 
> about a “RFC violation” [3]:
> 
> Do you know of other solutions?

Given how thinly MTA-STS is implemented, the simplest solution is to just route 
a few of the major mta-sts domains (gmail.com, outlook.com, and a few others) 
to a dedicated smtp(8) transport that uses the mta-sts policy addon, and just 
enable DANE for the rest.

We may yet integrate mta-sts support into Postfix some day, but for now you'll 
need to compromise in some manner.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an 
email to postfix-users-le...@postfix.org

_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to