On Wed, Oct 23, 2024 at 07:15:31PM +0800, Wesley via Postfix-users wrote:
> please see this default value,
>
> # postconf -d smtp_tls_security_level
> smtp_tls_security_level =
The default value maintains backwards-compatibility with Postfix ~2.2
when TLS support was first merged into Postfix based on original patches
by Lutz Jänicke. At the time TLS client security was defined by
separate boolean parameters:
smtp_use_tls
smtp_enforce_tls
smtp_tls_enforce_peername
These separate parameters were subsumed by the single
smtp_tls_security_level
and are now obsolete, but the default behaviour is to honour these
legacy parameters, when their replacement is not explicitly specified.
> does this mean if using the default value, Postfix will deliver
> messages to peer MTA without using ssl/tls always, even the peer
> supports encryption connection?
No, see above. But note that with opportunistic TLS, i.e. either of:
- smtp_use_tls = yes
smtp_enforce_tls = no
- smtp_security_level = may
Postfix will fall back to cleartext transmission when either the remote
server does not offer STARTTLS, or when STARTTLS fails to be negotiated
(by default once a message has been in the queue for a minimum time).
If you really want mandatory TLS, and can afford to not be able to send
email to non-TLS peers, then you'd need at least:
smtpd_tls_security_level = encrypt
What's still missing is a way to specify "encrypt" as a minimum fallback
from "dane", when the remote MX host does not have DNSSEC signed TLSA
records. This requires some spare cycles to implement.
--
Viktor.
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]