On Sun, Jan 13, 2013 at 08:17:47PM +0100, Stefan Sels wrote: > It is true that TLS/SMTP is often used but rarely discussed while making > new SMTP/TLS RFCs. Most stuff is written with https and browsers in > mind. There is a RFC-draft for S/MIME TLSA though: > > http://tools.ietf.org/html/draft-hoffman-dane-smime-00
S/MIME is of course quite unrelated to transport. > > So when a CA is involved (certificate usage 0 or 2) the imputed > > TLS policy would be: > > > > example.com secure \ > > digest=sha-256 \ > > rootca=<some-fingerprint> \ > > rootca=<another-fingerprint> ... \ > > match=<already-supported-match-syntax> > > > > and when a CA is not involved (certificate usage 1 or 3) the imputed > > TLS policy would be: > > > > example.com fingerprint \ > > digest=sha-256 \ > > match=<fingerprint> \ > > match=<another-fingerprint> ... > > that would be computed parameters? or fixed configuration (just to > understand the example correctly) ? I said "imputed TLS policy". That is "assigned by inference". The same policy could also be set explicitly in a policy table, for example, by running a script the securely polss DNS TLSA RRsets from time to time (for selected destination domains) and constructs TLS policy table entries. > > The DANE specification potentially supports mixed security models, > > wherein some of the elements of a TLSA RRset specify usage 0 or 2, > > and others usage 1 or 3. This is not easily accomodated by Postfix > > at this time, since the TLS library supports exactly one of the > > two security models for a given connection. > > Maybe the client could signal the security model/use case within the TLS > handshake? Like an extension to STARTTLS (or even STARTTLSA but that > would be messy). Just brain storming here.. This makes no sense. > > I would be inclined to ignore usage 0 and 2, when 1 or 3 is present, > > since given the expected peer certificate, there is no need for > > any CAs. > > Yeah. Currently we just look if any client cert is given. It would be > actually an improvement if we could at least verify that it is > associated with the given DNS records. The discussion in DANE is about server certificates, clients don't fit into a "_service._proto.fqdn IN TLSA" lookup model. Postfix supports certificate checks, but in practice only for a handful of destinations. -- Viktor.