Postfix 2.11.0 is now in code-freeze.  With 2.11.0-RC2 the DANE
support is feature complete, and matches the DANE SMTP draft.

The official 2.11.0 release will happen in the next couple of weeks.
Test feedback welcome.

    http://www.postfix.org/TLS_README.html#client_tls_dane
    http://www.postfix.org/TLS_README.html#client_tls_policy

While I am busy with IETF drafts, some brave souls have volunteered
to contribute a more consolidated DANE_README tutorial.  I'll post
a link here when/if all goes well on that front.  Currently the
DANE related information is scattered over a few documents.

Minimal client configuration:

    Note: A DNSSEC validating resolver MUST be present on the
    LOOPBACK interface and MUST be the only resolver listed in
    /etc/resolv.conf.  Postfix delegates DNSSEC processing to the
    system's caching resolver.  A local resolver is in any case a
    good idea for an MTA that handles non-trivial mail volumes.

    /etc/resolv.conf:
        nameserver 127.0.0.1

    main.cf:
        smtp_host_lookup = dns
        smtp_dns_support_level = dnssec
        smtp_tls_security_level = dane
        ignore_mx_lookup_error = no

Recommended Server DNS configuration:

        example.com. IN MX 0 mx.example.com.

    Publish one of the two TLSA record forms below, the remaining
    22 combinations have little to recommend them:

        ; Per-service EE SPKI TLSA RR:
        ;
        _25._tcp.mx.example.com. IN TLSA 3 1 1 {EE SPKI SHA2-256 digest}

        or

        ; Domain-wide TA CERT TLSA RR, aliased from each service:
        ;
        _25._tcp.mx.example.com. IN CNAME 2.1.1._tlsa.example.com.
        2.1.1._tlsa.example.com. IN TLSA 2 0 1 {TA CERT SHA2-256 digest}

    In the second case the domain-issued TA certificate MUST be
    included in the server chain file:

        # cd /etc/postfix
        # cat ee-cert.pem intermediate.pem ... root-ta.pem > chain.pem
        # postconf -e 'smtpd_tls_security_level = may'
        # postconf -e 'smtpd_tls_cert_file = ${config_directory}/chain.pem'
        # postconf -e 'smtpd_tls_key_file = ${config_directory}/ee-key.pem'

    and the ee-cert MUST have at least one of "mx.example.com" or
    "example.com" as a DNS subjectAltName or subject commonName.

    Avoid wildcard certs, they may allow MITM attackers to redirect
    connections to the wrong hosts.

See http://www.postfix.org/FORWARD_SECRECY_README.html for additional
server TLS tuning.

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to