On 15:43 Wed 28 Jan     , Wietse Venema wrote:
> That is, if the SASL client was activated then we update it,
> and otherwise we don't bother (don't wake up sleeping dogs).

Okay. I'll use the way you have it, do you want me to resubmit that?

> The choice of SASL security options is unclear. If TLS is turned
> on, then it was turned on by the XCLIENT proxy. We don't know if
> it is safe for the remote SMTP client to send its passwords in
> plaintext.

I understand the concern here. In our case, the proxy will always
initiate the connection to the postfix machines with the same security
used in the original connection.  Inbound plaintext connections will
proxy as plaintext, TLS as TLS, and thus this is not an issue for us.  

XCLIENT doesn't appear to have a way to say if the client connection is
secured or not. If that existed, I suppose it could use that instead,
but otherwise I can't see that there is a solution here.  With no
alternative, it makes sense to me to trust the sysadmins setting up the
proxy architecture.  Do you have any other ideas?

Thanks, Matthew

Attachment: pgpY48ShFl_L4.pgp
Description: PGP signature

Reply via email to