Re: TLS client logging PATCH

2014-02-26 Thread Viktor Dukhovni
On Wed, Feb 26, 2014 at 05:40:38PM +0100, li...@rhsoft.net wrote: > that's why I wanted to make clear if the limitation is a > strong technical one or "only" highly recommended Strongly recommended for all but the most determined DIY users who are at the mercy of their own skills and attention to

Re: TLS client logging PATCH

2014-02-26 Thread li...@rhsoft.net
Am 26.02.2014 17:30, schrieb Viktor Dukhovni: >> no - the two dns servers are already in the LAN and working >> >> they are trusted and if i do not trust my own LAN i also can >> not trust a forwarder running on 127.0.0.1 asking them > > Without an anti-spoofing firewall, remote name servers may b

Re: TLS client logging PATCH

2014-02-26 Thread Viktor Dukhovni
On Wed, Feb 26, 2014 at 10:42:29AM +0100, li...@rhsoft.net wrote: > > If the LAN housing the MTAs and multiple caching nameservers is > > physically secure and well firewalled, you could potentially rely > > on that physical security and firewall anti-spoofing rules. > > that is the point: if i d

Re: TLS client logging PATCH

2014-02-26 Thread lst_hoe02
Zitat von li...@rhsoft.net: Am 26.02.2014 12:48, schrieb Wietse Venema: lst_ho...@kwsoft.de: Yes, of course. In practice, for most users, the local resolver is by far the simplest configuration. Is or will this be "enforced" by Postfix in some way for DANE? Postfix does not parse /etc/re

Re: TLS client logging PATCH

2014-02-26 Thread li...@rhsoft.net
Am 26.02.2014 12:57, schrieb Wietse Venema: > li...@rhsoft.net: >> Am 26.02.2014 12:48, schrieb Wietse Venema: >>> lst_ho...@kwsoft.de: > Yes, of course. In practice, for most users, the local resolver > is by far the simplest configuration. Is or will this be "enforced" by Pos

Re: TLS client logging PATCH

2014-02-26 Thread Wietse Venema
li...@rhsoft.net: > Am 26.02.2014 12:48, schrieb Wietse Venema: > > lst_ho...@kwsoft.de: > >>> Yes, of course. In practice, for most users, the local resolver > >>> is by far the simplest configuration. > >> > >> Is or will this be "enforced" by Postfix in some way for DANE? > > > > Postfix does

Re: TLS client logging PATCH

2014-02-26 Thread li...@rhsoft.net
Am 26.02.2014 12:48, schrieb Wietse Venema: > lst_ho...@kwsoft.de: >>> Yes, of course. In practice, for most users, the local resolver >>> is by far the simplest configuration. >> >> Is or will this be "enforced" by Postfix in some way for DANE? > > Postfix does not parse /etc/resolv.conf so c

Re: TLS client logging PATCH

2014-02-26 Thread lst_hoe02
Zitat von wie...@porcupine.org: lst_ho...@kwsoft.de: > Yes, of course. In practice, for most users, the local resolver > is by far the simplest configuration. Is or will this be "enforced" by Postfix in some way for DANE? Postfix does not parse /etc/resolv.conf. Wietse Thanks!

Re: TLS client logging PATCH

2014-02-26 Thread Wietse Venema
lst_ho...@kwsoft.de: > > Yes, of course. In practice, for most users, the local resolver > > is by far the simplest configuration. > > Is or will this be "enforced" by Postfix in some way for DANE? Postfix does not parse /etc/resolv.conf. Wietse

Re: TLS client logging PATCH

2014-02-26 Thread lst_hoe02
Zitat von Viktor Dukhovni : On Wed, Feb 26, 2014 at 07:43:25AM +0100, Erwan David wrote: > The local resolver can have the resolvers on the LAN configured as > forwarders, but you need the local stub resolver. No reason not to have > one, really, especially on a busy mail server. However you

Re: TLS client logging PATCH

2014-02-26 Thread li...@rhsoft.net
Am 26.02.2014 07:33, schrieb Viktor Dukhovni: > On Wed, Feb 26, 2014 at 12:54:37AM +0100, li...@rhsoft.net wrote: > >>> The local resolver can have the resolvers on the LAN configured as >>> forwarders, but you need the local stub resolver. No reason not to have >>> one, really, especially on

Re: TLS client logging PATCH

2014-02-26 Thread li...@rhsoft.net
Am 26.02.2014 02:25, schrieb DTNX Postmaster: > On 26 Feb 2014, at 00:54, li...@rhsoft.net wrote: >> Am 26.02.2014 00:46, schrieb DTNX Postmaster: >>> On 26 Feb 2014, at 00:29, li...@rhsoft.net wrote: Am 25.02.2014 17:41, schrieb Dirk Stöcker: > On Tue, 25 Feb 2014, Viktor Dukhovni wrote:

Re: TLS client logging PATCH

2014-02-26 Thread DTNX Postmaster
On 26 Feb 2014, at 07:46, Viktor Dukhovni wrote: > On Wed, Feb 26, 2014 at 07:43:25AM +0100, Erwan David wrote: > >>> The local resolver can have the resolvers on the LAN configured as >>> forwarders, but you need the local stub resolver. No reason not to have >>> one, really, especially on a

Re: TLS client logging PATCH

2014-02-25 Thread Viktor Dukhovni
On Wed, Feb 26, 2014 at 07:43:25AM +0100, Erwan David wrote: > > The local resolver can have the resolvers on the LAN configured as > > forwarders, but you need the local stub resolver. No reason not to have > > one, really, especially on a busy mail server. > > However your "local" resolver co

Re: TLS client logging PATCH

2014-02-25 Thread Erwan David
On Wed, Feb 26, 2014 at 12:46:13AM CET, DTNX Postmaster said: > On 26 Feb 2014, at 00:29, li...@rhsoft.net wrote: > > > Am 25.02.2014 17:41, schrieb Dirk Stöcker: > >> On Tue, 25 Feb 2014, Viktor Dukhovni wrote: > smtp_dns_support_level = dnssec > > was enough to fix this. I'll s

Re: TLS client logging PATCH

2014-02-25 Thread Viktor Dukhovni
On Wed, Feb 26, 2014 at 12:54:37AM +0100, li...@rhsoft.net wrote: > > The local resolver can have the resolvers on the LAN configured as > > forwarders, but you need the local stub resolver. No reason not to have > > one, really, especially on a busy mail server > > yes, you normally have a loc

Re: TLS client logging PATCH

2014-02-25 Thread DTNX Postmaster
On 26 Feb 2014, at 00:54, li...@rhsoft.net wrote: > Am 26.02.2014 00:46, schrieb DTNX Postmaster: >> On 26 Feb 2014, at 00:29, li...@rhsoft.net wrote: >>> Am 25.02.2014 17:41, schrieb Dirk Stöcker: On Tue, 25 Feb 2014, Viktor Dukhovni wrote: >> smtp_dns_support_level = dnssec >>

Re: TLS client logging PATCH

2014-02-25 Thread li...@rhsoft.net
Am 26.02.2014 00:46, schrieb DTNX Postmaster: > On 26 Feb 2014, at 00:29, li...@rhsoft.net wrote: >> Am 25.02.2014 17:41, schrieb Dirk Stöcker: >>> On Tue, 25 Feb 2014, Viktor Dukhovni wrote: > smtp_dns_support_level = dnssec > > was enough to fix this. I'll see how many servers will

Re: TLS client logging PATCH

2014-02-25 Thread DTNX Postmaster
On 26 Feb 2014, at 00:29, li...@rhsoft.net wrote: > Am 25.02.2014 17:41, schrieb Dirk Stöcker: >> On Tue, 25 Feb 2014, Viktor Dukhovni wrote: smtp_dns_support_level = dnssec was enough to fix this. I'll see how many servers will have a "Verified" connection in the future. >>>

Re: TLS client logging PATCH

2014-02-25 Thread li...@rhsoft.net
Am 25.02.2014 17:41, schrieb Dirk Stöcker: > On Tue, 25 Feb 2014, Viktor Dukhovni wrote: >>> smtp_dns_support_level = dnssec >>> >>> was enough to fix this. I'll see how many servers will have a >>> "Verified" connection in the future. >> >> I hope you read the note about the importance of having

Re: TLS client logging PATCH

2014-02-25 Thread Dirk Stöcker
On Tue, 25 Feb 2014, Viktor Dukhovni wrote: smtp_dns_support_level = dnssec was enough to fix this. I'll see how many servers will have a "Verified" connection in the future. I hope you read the note about the importance of having 127.0.0.1 and/or ::1 as the only nameservers listed in /etc/re

Re: TLS client logging PATCH

2014-02-25 Thread Patrick Ben Koetter
* Viktor Dukhovni : > On Tue, Feb 25, 2014 at 09:57:13AM +0100, Dirk St?cker wrote: > > > smtp_dns_support_level = dnssec > > > > was enough to fix this. I'll see how many servers will have a > > "Verified" connection in the future. > > I hope you read the note about the importance of having 127

Re: TLS client logging PATCH

2014-02-25 Thread Viktor Dukhovni
On Tue, Feb 25, 2014 at 09:57:13AM +0100, Dirk St?cker wrote: > smtp_dns_support_level = dnssec > > was enough to fix this. I'll see how many servers will have a > "Verified" connection in the future. I hope you read the note about the importance of having 127.0.0.1 and/or ::1 as the only namese

Re: DNSSEC, was Re: TLS client logging PATCH

2014-02-25 Thread Charles Marcus
On 2/24/2014 3:52 PM, /dev/rob0 wrote: On Mon, Feb 24, 2014 at 01:16:39AM +0100, Dirk Stöcker wrote: On Sun, 23 Feb 2014, Viktor Dukhovni wrote: If you want scalable security for SMTP, become an early adopter of DANE TLS, available in Postfix 2.11. Today, you'll be able to opportunistically a

Re: TLS client logging PATCH

2014-02-25 Thread Dirk Stöcker
On Tue, 25 Feb 2014, Dirk Stöcker wrote: Hmpf. It says "dane configured with dnssec lookups disabled". Seems I need to fix the RPM first. No, a smtp_dns_support_level = dnssec was enough to fix this. I'll see how many servers will have a "Verified" connection in the future. Ciao -- http:/

Re: TLS client logging PATCH

2014-02-25 Thread Dirk Stöcker
Hello, But I have no idea how to use the postfix tools to start a TLS connection to such an server without sending an email. This requires too much internal knowledge I fear. Last time I tried to call smtp tool by hand it told me not to do so and I took that advice. /usr/sbin/sendmail -f $(

Re: TLS client logging PATCH

2014-02-24 Thread list
On Mon, Feb 24, 2014 at 04:38:12PM -0600, /dev/rob0 wrote: > On Mon, Feb 24, 2014 at 02:36:46PM -0700, LuKreme wrote: > > On 24 Feb 2014, at 06:09 , Viktor Dukhovni > > wrote: > > > On Mon, Feb 24, 2014 at 12:26:42PM +0100, Dirk St?cker wrote: > > > > > > Nonsense. Patrick Koetter's .de domain

Re: TLS client logging PATCH

2014-02-24 Thread /dev/rob0
On Mon, Feb 24, 2014 at 02:36:46PM -0700, LuKreme wrote: > On 24 Feb 2014, at 06:09 , Viktor Dukhovni > wrote: > > On Mon, Feb 24, 2014 at 12:26:42PM +0100, Dirk St?cker wrote: > > > > Nonsense. Patrick Koetter's .de domain is DNSSEC signed. His > > mailserver has TLSA records. Enabling DNSS

Re: TLS client logging PATCH

2014-02-24 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 10:15:48PM +0100, Dirk St?cker wrote: > >You're asking for a verification status that would indicate > >conditional MITM protection: > > > > - False negative: MITM protection is illusory when the MX > > hostname is compromised through DNS record forgery. > > > > - F

Re: TLS client logging PATCH

2014-02-24 Thread LuKreme
On 24 Feb 2014, at 06:09 , Viktor Dukhovni wrote: > On Mon, Feb 24, 2014 at 12:26:42PM +0100, Dirk St?cker wrote: > > Nonsense. Patrick Koetter's .de domain is DNSSEC signed. His > mailserver has TLSA records. Enabling DNSSEC does not prevent you > from communicating with the rest of the world

Re: TLS client logging PATCH

2014-02-24 Thread Dirk Stöcker
On Mon, 24 Feb 2014, Viktor Dukhovni wrote: With a bit of luck roughly 5 years. Exim has not implemented DANE yet, and the RFC for DANE TLS for SMTP has not yet been ratified by the IETF. The first Postfix release with DANE just came out last month, and is not in most O/S distributions. You'

DNSSEC, was Re: TLS client logging PATCH

2014-02-24 Thread /dev/rob0
On Mon, Feb 24, 2014 at 01:16:39AM +0100, Dirk Stöcker wrote: > On Sun, 23 Feb 2014, Viktor Dukhovni wrote: > >If you want scalable security for SMTP, become an early adopter > >of DANE TLS, available in Postfix 2.11. Today, you'll be able > >to opportunistically authenticate the handful of DNSSEC

Re: TLS client logging PATCH

2014-02-24 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 07:03:21PM +0100, Dirk St?cker wrote: > >Nonsense. Patrick Koetter's .de domain is DNSSEC signed. His > >mailserver has TLSA records. Enabling DNSSEC does not prevent you > >from communicating with the rest of the world. Furthermore, you > >can enable DNSSEC validation

Re: TLS client logging PATCH

2014-02-24 Thread Robert Schetterer
Am 24.02.2014 19:03, schrieb Dirk Stöcker: > On Mon, 24 Feb 2014, Viktor Dukhovni wrote: > >>> I don't want to have a perfection box which can't communicate with >>> the rest of the world, but something which helps with todays >>> internet. >> >> Nonsense. Patrick Koetter's .de domain is DNSSEC s

Re: TLS client logging PATCH

2014-02-24 Thread Dirk Stöcker
On Mon, 24 Feb 2014, Viktor Dukhovni wrote: I don't want to have a perfection box which can't communicate with the rest of the world, but something which helps with todays internet. Nonsense. Patrick Koetter's .de domain is DNSSEC signed. His mailserver has TLSA records. Enabling DNSSEC doe

Re: TLS client logging PATCH

2014-02-24 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 12:26:42PM +0100, Dirk St?cker wrote: > > >Oh yes - DNSSEC. When will it come? In hundred years? > > > >Available today. Two of my domains are signed, the third will be > >shortly. And you're complaining about people being complacent and > >stuck in the past. > > I don't

Heuristics are not security (was: TLS client logging PATCH)

2014-02-24 Thread Wietse Venema
Dirk St?cker: > >> 5) with a trusted cert matching the hostname + hostname == reverse DNS > > > > This is even more meaningless. > > It is an additional level of security. Only a very small bit, yes, but it PLEASE DO NOT call this "security". This stuff is weaker than spam filter heuristics, an

Re: TLS client logging PATCH

2014-02-24 Thread Dirk Stöcker
On Mon, 24 Feb 2014, Viktor Dukhovni wrote: I know that there are many side-effects and things which don't work, but that does not mean that one can at least try? Sorry, no half-assed solutions that work only sometimes and break unpredictably. Yes, the same story again. When it does not work

Re: TLS client logging PATCH

2014-02-23 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 01:16:39AM +0100, Dirk St?cker wrote: > >SMTP is not HTTP. Due to MX indirection, peer authentication is > >not possible without explicit per-destination configuration. Once > >you've gone to all that trouble, you may as well configure a "secure" > >channel. > > I know t

Re: TLS client logging PATCH

2014-02-23 Thread Wietse Venema
Dirk St?cker: > On Sun, 23 Feb 2014, Viktor Dukhovni wrote: > > >> I hope there aren't any TLS capable mailservers, which fallback to > >> unencrypted transmission, when I use this. > > > > Fallback is up the client. I am not aware of any Internet facing > > MX hosts that offer STARTTLS without a

Re: TLS client logging PATCH

2014-02-23 Thread LuKreme
On 23 Feb 2014, at 15:57 , Dirk Stöcker wrote: > Seems Postfix still need to learn a lot about secure connections. Your No, you are simply not understanding the purpose of opportunistic TLS. The purpose is not to verify identity, but simply to encrypt the transmission channel. Identity is meani

Re: TLS client logging PATCH

2014-02-23 Thread li...@rhsoft.net
Am 24.02.2014 01:16, schrieb Dirk Stöcker: > On Sun, 23 Feb 2014, Viktor Dukhovni wrote: >>> smtp_tls_verify_certs=whenpossible >> >> SMTP is not HTTP. Due to MX indirection, peer authentication is >> not possible without explicit per-destination configuration. Once >> you've gone to all that

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Viktor Dukhovni wrote: I hope there aren't any TLS capable mailservers, which fallback to unencrypted transmission, when I use this. Fallback is up the client. I am not aware of any Internet facing MX hosts that offer STARTTLS without any server certificate. Lots of SMTP

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Viktor Dukhovni wrote: smtp_tls_verify_certs=whenpossible SMTP is not HTTP. Due to MX indirection, peer authentication is not possible without explicit per-destination configuration. Once you've gone to all that trouble, you may as well configure a "secure" channel. I

Re: TLS client logging PATCH

2014-02-23 Thread Viktor Dukhovni
On Mon, Feb 24, 2014 at 12:25:50AM +0100, Dirk St?cker wrote: > >> smtp_tls_exclude_ciphers=aNULL > >> > >> for the transport that delivers mail between your internal systems. > > > >Does not sound like what I want. I don't want to hardcode a > >specific handling for some servers, I want that the

Re: TLS client logging PATCH

2014-02-23 Thread Viktor Dukhovni
On Sun, Feb 23, 2014 at 11:57:35PM +0100, Dirk St?cker wrote: > >When both sides are Postfix, and the client is opportunistic, the > >server and client typically agree to a cipher-suite without any > >certificates. Why bother, if the client does not check anyway. > > Because it allows to at to l

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Dirk Stöcker wrote: If this is important to you, set: smtp_tls_exclude_ciphers=aNULL for the transport that delivers mail between your internal systems. Does not sound like what I want. I don't want to hardcode a specific handling for some servers, I want that the "

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Mon, 24 Feb 2014, li...@rhsoft.net wrote: Seems Postfix still need to learn a lot about secure connections seems you need to do so in case of opportunistic there is not real trust trusted in case of a secure connection means both sides know each other - opportunistic means the other side

Re: TLS client logging PATCH

2014-02-23 Thread li...@rhsoft.net
Am 23.02.2014 23:57, schrieb Dirk Stöcker: > Seems Postfix still need to learn a lot about secure connections seems you need to do so in case of opportunistic there is not real trust trusted in case of a secure connection means both sides know each other - opportunistic means the other side nee

Re: TLS client logging PATCH

2014-02-23 Thread Dirk Stöcker
On Sun, 23 Feb 2014, Viktor Dukhovni wrote: On Sun, Feb 23, 2014 at 02:28:07PM +0100, Dirk St?cker wrote: And whatever I do I'm unable to get any of these three to show a trusted connection to any of the others. It trusts Google and GMX and whatever, but not my own servers. That's disturbing.

Re: TLS client logging PATCH: (was: Always "Untrusted TLS" for own Postfix instances)

2014-02-23 Thread Wietse Venema
Viktor Dukhovni: > diff --git a/src/tls/tls_client.c b/src/tls/tls_client.c > --- a/src/tls/tls_client.c > +++ b/src/tls/tls_client.c > @@ -1045,7 +1045,9 @@ TLS_SESS_STATE *tls_client_start(const > TLS_CLIENT_START_PROPS *props) > */ > if (log_mask & TLS_LOG_SUMMARY) > msg_info("

TLS client logging PATCH: (was: Always "Untrusted TLS" for own Postfix instances)

2014-02-23 Thread Viktor Dukhovni
On Sun, Feb 23, 2014 at 02:28:07PM +0100, Dirk St?cker wrote: > And whatever I do I'm unable to get any of these three to show a > trusted connection to any of the others. It trusts Google and GMX > and whatever, but not my own servers. That's disturbing. > > Here the configs I use essentially E