[pfx] Re: dnsbl lookup binding address?

2025-02-09 Thread Wietse Venema via Postfix-users
Sean McBride: > On 9 Feb 2025, at 10:00, Wietse Venema via Postfix-users wrote: > > > Please use a real resolver. RedHat tooling may be fine for desktoops > > but not for infrastructure. That's the polite version. > > Gotcha, thanks. > > Alternatively, if I use FreeBSD, is the local-unbound(8) t

[pfx] Re: dnsbl lookup binding address?

2025-02-09 Thread Bill Cole via Postfix-users
On 2025-02-09 at 12:45:00 UTC-0500 (Sun, 09 Feb 2025 12:45:00 -0500) Sean McBride via Postfix-users is rumored to have said: On 9 Feb 2025, at 10:00, Wietse Venema via Postfix-users wrote: Please use a real resolver. RedHat tooling may be fine for desktoops but not for infrastructure. That's

[pfx] Re: dnsbl lookup binding address?

2025-02-09 Thread Sean McBride via Postfix-users
On 9 Feb 2025, at 10:00, Wietse Venema via Postfix-users wrote: > Please use a real resolver. RedHat tooling may be fine for desktoops > but not for infrastructure. That's the polite version. Gotcha, thanks. Alternatively, if I use FreeBSD, is the local-unbound(8) that's installed in base usabl

[pfx] Re: Hijacked thread (was: Allow opportunistic DANE when non-DNSSEC...)

2025-02-09 Thread Ömer Güven via Postfix-users
Thanks for separating. Forwarded the remaining thread that was decoupled from the mailing list: > Von: Ömer Güven > Datum: 9. Februar 2025 um 18:30:08 MEZ > An: akritrim® Intelligence™ > Betreff: Aw: [pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC > signed MX points to DNSSEC-s

[pfx] Hijacked thread (was: Allow opportunistic DANE when non-DNSSEC...)

2025-02-09 Thread Wietse Venema via Postfix-users
This is not a tlspol question. > sending to gmail shows up as verified connections but With Postfix, 'verified' means that the certificate matched, either by name or by fingerprint (from certificate or public key). > recieving from gmail shows up as trusted connections With Postfix, 'trusted'

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Ömer Güven via Postfix-users
Please consider this example: tum.de is dane-only mri.tum.de is dane (because they didn‘t sign the MX record, but the MX is virtually the same signed DANE-supporting SMTP server) The Postfix config looks like this: smtp_dns_support_level = dnssec smtp_tls_security_level = may smtp_tls_policy_ma

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Ömer Güven via Postfix-users
Please open an issue in GitHub for problems with postfix-tlspol in the future. I can say that you probably misconfigured something. It has to say ‚Verified TLS‘, so it didn‘t work in your case. Did you use the correct port and socketmap verb? It isn‘t the same as postfix-mta-sts-resolver (socket

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Viktor Dukhovni via Postfix-users
On Sun, Feb 09, 2025 at 04:35:03PM +0100, Ömer Güven via Postfix-users wrote: > I can only endorse this. Simply setting it to „dane“ should solve the > hassle and make the operation more consistent and predictable. The whole thing is a misunderstanding. The insecure MX setting is only ever used

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Ömer Güven via Postfix-users
I can only endorse this. Simply setting it to „dane“ should solve the hassle and make the operation more consistent and predictable. Thanks, Ömer > Am 09.02.2025 um 15:58 schrieb Wietse Venema via Postfix-users > : > > I think that the mistake was to make smtp_tls_dane_insecure_mx_policy >

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread akritrim® Intelligence™ via Postfix-users
I observed that with postfix-tlspol : mails sent to and from gmail show up as trusted connections while with postfix-mta-sts-resolver: srnding to gmail shows up as verified connections but recieving from gmail shows up as trusted connections and i was wondering why. cheers On February 9, 20

[pfx] Re: dnsbl lookup binding address?

2025-02-09 Thread Wietse Venema via Postfix-users
Sean McBride via Postfix-users: > On 23 Jan 2025, at 9:56, Bill Cole via Postfix-users wrote: > > > Your solution is to run a local, caching, fully-recursive name > > resolver. The simplest way to do that is with the Unbound resolver. > > This is a best practice for all mail servers because MTAs

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Wietse Venema via Postfix-users
I think that the mistake was to make smtp_tls_dane_insecure_mx_policy dependent on smtp_tls_security_level Will it please Viktor and Omer if I change the default to smtp_tls_dane_insecure_mx_policy = dane That seems to have less of a WTF factor. Here is my motivation to make make dane poli