On Thu, Oct 24, 2024 at 01:24:07PM +0300, Eugene R via Postfix-users wrote:

> On 24.10.2024 08:24, Viktor Dukhovni via Postfix-users wrote:
> > Yes, of course, as documented.  TLS is off by default, this is
> > backwards-compatible behaviour, and Postfix aims to not "surprise"
> > operators with unexpected new behaviour after an upgrade.  Default
> > settings are in part also the responsibility of vendor distributions
> > that determine how the Postfix software is built, and what settings
> > are used in initial deployments.
> > 
> > Now perhaps at this point, we could (if Wietse concurs) change the
> > default security level to "may" when (almost always nowdays) TLS is
> > enabled at compile time.  Gmail stats for TLS in/out are quite close
> > lately to 100% in both directions:
> 
> But with "TLS on by default out of the box", who and how will be responsible
> for providing the valid certificates? I am not sure it can (and should) be
> handled automatically, as it requires an operator to make certain policy and
> technical decisions as well as to specify various data values. Even when
> using, e.g., a script from Dovecot to generate a self-signed certificate.

We're talking about the SMTP client, not the server.  As for the server,
OS distros could easily arrange to generate a "snake-oil" (self-signed)
cert (IIRC Debian has one by default).

Meanwhile, on the server side we could set:

    # Default to "may" when a cert file is configured.
    #
    smtpd_tls_security_level =
        ${smtpd_tls_chain_files ? {may} :
          {${smtpd_tls_cert_file ? {may} :
             {${smtpd_tls_eccert_file ? {may} :
                {${smtpd_tls_dcert_file ? {may}}}}}}}}

Possibly with a top-level compatibility-level guard.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to