-
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FYI, Postfix smtp_tls_dane_insecure_mx_policy is being fixed #12
Comments
To add some details for the interested postmasters: The bug caused some emails to unexpectedly downgrade to weaker encryption (and plaintext in theory) instead of using opportunistic DANE when it was available and requested by a policy table. This issue only affected cases where To clarify: This issue does not impact mandatory DANE ( To fix this, the default setting is being restored to |
just for my understanding ;-) Does this mean that with this setting |
Basically yes. Not as secure as mandatory DANE, but still better than the alternative: unauthenticated TLS or trusted TLS via classical Certification Authorities. PS: This already happens on your setup with your default |
nice feature :-) But an attacker in position to spoof DNS replies could "insert" a higher (lower) prio MX with no TLSA records and then postfix would connect with |
This is why it's called insecure MX lookup. An attacker capable of manipulating any non-DNSSEC signed data also could add a trusted TLS certificate for its own domain (say Letsencrypt for smtp.maliciousprovider.com) and redirect the mails, even with opportunistic DANE disabled. Postfix would log "trusted connection established". So this isn't a problem introduced by opportunistic DANE. PS: This is not really a feature, Postfix does this since the first implementation of DANE support. It is just about a bug that prevents the expected behavior under some very limited scenarios. This is why Wietse is going to push a patch to every supported minor version. |
There was some discussion on the postfix-users mailing list about unexpected behavior of the smtp_tls_dane_insecure_mx_policy setting. This was the result of a bad change in the default value that was introduced in Postfix 3.6.
The change is being reverted to the default that was in effect with Postfix 3.5 and earlier: the fixed default setting is
smtp_tls_dane_insecure_mx_policy = dane
. There will be updated releases for Postfix 3.6..3.10.The text was updated successfully, but these errors were encountered: