Thanks for separating.

Forwarded the remaining thread that was decoupled from the mailing list:

> Von: Ömer Güven <omer.gu...@zuplu.com>
> Datum: 9. Februar 2025 um 18:30:08 MEZ
> An: akritrim® Intelligence™ <inli...@akritrim.net>
> Betreff: Aw: [pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC 
> signed MX points to DNSSEC-signed SMTP server with TLSA enabled
> 
> Please ensure that your DNS resolver is set up correctly. Maybe it queried a 
> „not found“ and cached that before you corrected the DNS setting in 
> config.yaml. This seems the most likely case as manual querying returns a 
> normal result. Normally querying should not take more than 50-100 ms for both 
> lookups.
> After about 10-15 minutes, the cache should be cleared.
> I‘ll add a method to purge the cache manually in the next release.
> 
>> Am 09.02.2025 um 18:19 schrieb akritrim® Intelligence™ 
>> <inli...@akritrim.net>:
>> yup i did. also i get
>> 
>> INFO: No Policy found for gmail.com
>> 
>> however manual query returns the right result.
>> 
>> i tested outlook.com and it works perfectly.
>> 
>> so i don't think there is any issue with my setup.
>> 
>> there is one observation however. the manual query for dane takes more than 
>> 1 second for gmail while for outlook it takes around half of that and for 
>> some domains even less than that.
>> 
>> i am wondering if this is the problem. I am not sure if a bug report can be 
>> filed for this.
>> 
>> 
>> cheers
>> 
>>> On February 9, 2025 3:45:34 PM UTC, "Ömer Güven via Postfix-users" 
>>> <postfix-users@postfix.org> wrote:
>>> Please open an issue in GitHub for problems with postfix-tlspol in the 
>>> future.
>>> I can say that you probably misconfigured something. It has to say 
>>> ‚Verified TLS‘, so it didn‘t work in your case.
>>> 
>>> Did you use the correct port and socketmap verb?
>>> It isn‘t the same as postfix-mta-sts-resolver 
>>> (socketmap:inet:127.0.0.1:8461:postfix), but rather 
>>> socketmap:inet:127.0.0.1:8642:QUERY
>>> 
>>> Best,
>>> Ömer
>>> 
>>>> Am 09.02.2025 um 16:36 schrieb Ömer Güven <omer.gu...@zuplu.com>:
>>>> I can only endorse this. Simply setting it to „dane“ should solve the 
>>>> hassle and make the operation more consistent and predictable.
>>>> Thanks,
>>>> Ömer
>>>>> Am 09.02.2025 um 15:58 schrieb Wietse Venema via Postfix-users 
>>>>> <postfix-users@postfix.org>:
>>>>> I think that the mistake was to make smtp_tls_dane_insecure_mx_policy
>>>>> dependent on smtp_tls_security_level
>>>>> Will it please Viktor and Omer if I change the default to
>>>>> smtp_tls_dane_insecure_mx_policy = dane
>>>>> That seems to have less of a WTF factor.
>>>>> Here is my motivation to make make dane policy evaluation NOT
>>>>> dependent on smtp_tls_security_level.
>>>>> In today's world it seems natural, to me at least, to set
>>>>> smtp_tls_security_level to 'may' as a default baseline for all
>>>>> deliveries, and then use policy lookup for sites that are ready for
>>>>> stronger security.
>>>>> For this reason alone, smtp_tls_security_level is not a good
>>>>> way to express how to handle a DANE half-edge case.
>>>>> Asking people to configure different transports for this case,
>>>>> kind of defeats the purpose of having smtp_tls_policy_maps.
>>>>> Thus, I propose to decouple smtp_tls_dane_insecure_mx_policy
>>>>> from smtp_tls_security_level
>>>>> Starting with today's baseline level of 'may', Over time one can
>>>>> evolve the baseline to 'encrypt', and eventually use 'secure' as
>>>>> the baseline, and (NOTE: role switch!) use samtp_tls_policy_maps
>>>>> for sites that need weaker security.
>>>>> So there is my longer-term perspective: today, use policy maps to
>>>>> harden security for specific sites. In the future, use use policy
>>>>> maps to weaken security for specific sites.
>>>>> Decoupling smtp_tls_dane_insecure_mx_policy from smtp_tls_security_level
>>>>> will delay the Postfix 3.10.0 stable release by another day, but it
>>>>> would be worth it.
>>>>> Wietse
>>>>> _______________________________________________
>>>>> Postfix-users mailing list -- postfix-users@postfix.org
>>>>> To unsubscribe send an email to postfix-users-le...@postfix.org
>>>> _______________________________________________
>>>> Postfix-users mailing list -- postfix-users@postfix.org
>>>> To unsubscribe send an email to postfix-users-le...@postfix.org
>> 
>> akritrim® Intelligence™


> Am 09.02.2025 um 18:28 schrieb Wietse Venema via Postfix-users 
> <postfix-users@postfix.org>:
> 
> This is not a tlspol question.
> 
>> sending to gmail shows up as verified connections but
> 
> With Postfix, 'verified' means that the certificate matched, either
> by name or by fingerprint (from certificate or public key).
> 
>> recieving from gmail shows up as trusted connections
> 
> With Postfix, 'trusted' means that the chain of trust is valid,
> from the root all the way to the server certificate.
> 
> Postfix by default does not 'verify' client certificates. The TLS
> stack does not know what certificate name or fingerprint to expect
> ***DURING THE TLS HANDSSHAKE***.
> 
>    Wietse
> _______________________________________________
> Postfix-users mailing list -- postfix-users@postfix.org
> To unsubscribe send an email to postfix-users-le...@postfix.org

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to