[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sun, Feb 09, 2025 at 06:55:50AM +0100, Ömer Güven wrote: > I‘m the author of postfix-tlspol. I‘m not talking about manually adding > „dane“ for select destinations in a static map. > postfix-tlspol does evaluate the domain in realtime and returns the currently > best available policy. > > I h

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
I‘m the author of postfix-tlspol. I‘m not talking about manually adding „dane“ for select destinations in a static map. postfix-tlspol does evaluate the domain in realtime and returns the currently best available policy. I have to calculate the worst-case, like an user configuring „encrypt“ as

[pfx] Re: dnsbl lookup binding address?

2025-02-08 Thread Sean McBride via Postfix-users
On 23 Jan 2025, at 9:56, Bill Cole via Postfix-users wrote: Your solution is to run a local, caching, fully-recursive name resolver. The simplest way to do that is with the Unbound resolver. This is a best practice for all mail servers because MTAs do a lot of DNS and should not be using a res

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sun, Feb 09, 2025 at 03:00:22AM +0100, Ömer Güven wrote: > How did I misunderstand the settings if Wietse said that > smtp_tls_dane_insecure_mx_policy only defaults to dane, when the > smtp_tls_security_level variable is set to dane, else it defaults to > may, regardless of the security level r

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
I tested it: it is true. Setting the default security level to anything other than „dane“ (even encrypt, verify, secure…) and having the socketmap server return „dane“ downgrades to „may“ (but then negotiates unauth TLS because the remote of course supports encryption). This is a major design fl

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
How did I misunderstand the settings if Wietse said that smtp_tls_dane_insecure_mx_policy only defaults to dane, when the smtp_tls_security_level variable is set to dane, else it defaults to may, regardless of the security level returned by smtp_tls_policy_maps? Either is Wietse wrong or you di

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Feb 08, 2025 at 11:06:08PM +0100, Ömer Güven via Postfix-users wrote: > * Also: the current behavior is counter-intuitive and makes returning > „dane“ completely useless unless the default is also set to „dane“, > because postfix-tlspol only returns „dane“ if „dane-only“ isn‘t > possible b

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Feb 08, 2025 at 04:41:53PM -0500, Wietse Venema via Postfix-users wrote: > > smtp_tls_dane_insecure_mx_policy = ${{$smtp_tls_security_level} == {dane} ? > {dane} : {may}} > > I have one question: > > - Should this expression use the security level from >main.cf:smtp_tls_security_l

[pfx] Re: TLS_README.html suggestion: mention submissions and port 465

2025-02-08 Thread Wietse Venema via Postfix-users
Sean McBride via Postfix-users: > Hi all, > > I've been setting up a fresh postfix server, and I've really appreciated > how great the docs are. In the spirit of making them even better, I'd > like to share a comment/suggestion. > > If I correctly understand the messy history of port 465 vs 587

[pfx] TLS_README.html suggestion: mention submissions and port 465

2025-02-08 Thread Sean McBride via Postfix-users
Hi all, I've been setting up a fresh postfix server, and I've really appreciated how great the docs are. In the spirit of making them even better, I'd like to share a comment/suggestion. If I correctly understand the messy history of port 465 vs 587, for submission port 587 with StartTLS was

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
* Also: the current behavior is counter-intuitive and makes returning „dane“ completely useless unless the default is also set to „dane“, because postfix-tlspol only returns „dane“ if „dane-only“ isn‘t possible because of an unsigned MX record. „dane“ returned while the default is „encrypt“ woul

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
Oh, definitely the latter! Thank you for looking deeper in the code. Honoring the evaluated policy would ensure that Postfix tries DANE when the default is set to for example „encrypt“ and a socketmap server like postfix-tlspol returns „dane“ (because it detected DANE support after an insecure

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Sat, Feb 08, 2025 at 05:28:31PM +0100, ?mer G?ven via Postfix-users wrote: > > >RFC 7672 says that Opportunistic DANE (security level ?dane?, but not > >?dane-only?) may accept non-DNSSEC derived MX records be eligible for > >DANE on the DNSSEC-s

[pfx] Re: Virtual aliases issue

2025-02-08 Thread Wietse Venema via Postfix-users
IF Postfix appends the 'wrong domain' (usually, @$myorigin) to a virtual alias lookup result, THEN you need to specify the correct domain in the virtual alias lookup result. Wietse ___ Postfix-users mailing list -- postfix-users@postfix.org To u

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
I‘m perplexed. I never saw that configuration parameter until now and apparently misinterpreted my Postfix logs. Glad this isn’t an issue. Thanks! > Am 08.02.2025 um 17:42 schrieb Viktor Dukhovni via Postfix-users > : > > On Sat, Feb 08, 2025 at 05:28:31PM +0100, Ömer Güven via Postfix-users w

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Feb 08, 2025 at 05:28:31PM +0100, Ömer Güven via Postfix-users wrote: >RFC 7672 says that Opportunistic DANE (security level „dane“, but not >„dane-only“) may accept non-DNSSEC derived MX records be eligible for >DANE on the DNSSEC-signed (e. g. external) SMTP server. > >R

[pfx] [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
Hi!RFC 7672 says that Opportunistic DANE (security level „dane“, but not „dane-only“) may accept non-DNSSEC derived MX records be eligible for DANE on the DNSSEC-signed (e. g. external) SMTP server.RFC 7672 Section 2.2.1: Since the protocol in this memo is an Opportunistic Security protocol [R

[pfx] Virtual aliases issue

2025-02-08 Thread LS via Postfix-users
Hi everybody, I have a problem after moving our mail server to a new machine. Everything seems to be working so far - but not the virtual aliases. I'll try to explain: "test.mail.com" is a mail server administering several domains e.g. "my.domain". Mail user and aliases are stored in a MySQ