On Mon, Apr 01, 2013 at 03:37:04AM +0000, Viktor Dukhovni wrote:

> > When can we expect a Postfix release, that will support DANE
> > protocol ? so that it(postfix) can verify (using DANE & DNSSEC
> > protocols) the signed (and free) SSL/TLS certificates(cert) (or
> > fingerprints) which we can pre-add in TLSA, (CERT, HASTLS, etc) DNS
> > (DNSSEC) records, and then it(postfix) will use those(cert) for
> > secure (smtp) communication, and to verify SMTP servers.
> 
> If you're willing to be on the bleeding edge and want to help test
> code Wietse has not reviewed yet, you can try on a suitable
> non-critical system:

This is now available as a nonprod snapshot via the postfix.org mirrors
listed at:

        http://www.postfix.org/download.html

e.g.:

    
http://cdn.postfix.johnriley.me/mirrors/postfix-release/experimental/postfix-2.11-20130426-nonprod.tar.gz

Online docs for the snapshot are at:

    http://vdukhovni.github.io/postfix/

once this is a regular snapshot, the documentation will be at

    http://www.postfix.org/documentation.html

Feedback appreciated on:

        http://vdukhovni.github.io/postfix/TLS_README.html#server_cert_key
        http://vdukhovni.github.io/postfix/TLS_README.html#client_tls_dane

If in the mean-time any one turns on more DNSSEC domains and
publishes TLSA RRs for the domain's MX hosts, please drop me a
note.

Recommendation is to publish either "2 1 1" (and of course include
the TA cert in the server's TLS trust chain) or "3 1 1".  Feel free
to publish "3 1 1" for both RSA and ECDSA certs (Postfix MTAs can
be configured with both).

-- 
        Viktor.

Reply via email to