> On Jul 6, 2017, at 7:03 AM, Bastien Durel <[email protected]> wrote:
> 
> I have a setup where a MTA will forward mail to another node, based on ldap 
> configuration.
> It works well, but it uses ADH
> 
> Received: from corrin.geekwu.org (unknown [87.98.180.13])
>       (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
>       (No client certificate requested)
>       by arrakeen.geekwu.org (Postfix) with ESMTPS id A96DF6C07D
>       for <[email protected]>; Thu,  6 Jul 2017 01:52:53 +0200 (CEST)
> 
> I know I should not disable ADH on public interface, but I'd like to prevent 
> it on "private" interface (intra-cluster only), as "cluster" nodes does 
> communicate over Internet.

SMTP transport security policy is largely up to the client, not the
server.  See

        http://www.postfix.org/TLS_README.html#client_tls_limits
        http://www.postfix.org/TLS_README.html#client_tls_levels

The reason ADH is used, is that the client is not bothering to authenticate
the server, and so does not bother to ask for a certificate it will anyhow
ignore.  If you want secure transport, you need to set the client TLS
security level to "secure", "fingerprint", "dane" or "dane-only".

        http://www.postfix.org/TLS_README.html#client_tls_secure
        http://www.postfix.org/TLS_README.html#client_tls_fprint
        http://www.postfix.org/TLS_README.html#client_tls_dane

-- 
        Viktor.

Reply via email to