I think that the mistake was to make smtp_tls_dane_insecure_mx_policy
dependent on smtp_tls_security_level
Will it please Viktor and Omer if I change the default to
smtp_tls_dane_insecure_mx_policy = dane
That seems to have less of a WTF factor.
Here is my motivation to make make dane policy evaluation NOT
dependent on smtp_tls_security_level.
In today's world it seems natural, to me at least, to set
smtp_tls_security_level to 'may' as a default baseline for all
deliveries, and then use policy lookup for sites that are ready for
stronger security.
For this reason alone, smtp_tls_security_level is not a good
way to express how to handle a DANE half-edge case.
Asking people to configure different transports for this case,
kind of defeats the purpose of having smtp_tls_policy_maps.
Thus, I propose to decouple smtp_tls_dane_insecure_mx_policy
from smtp_tls_security_level
Starting with today's baseline level of 'may', Over time one can
evolve the baseline to 'encrypt', and eventually use 'secure' as
the baseline, and (NOTE: role switch!) use samtp_tls_policy_maps
for sites that need weaker security.
So there is my longer-term perspective: today, use policy maps to
harden security for specific sites. In the future, use use policy
maps to weaken security for specific sites.
Decoupling smtp_tls_dane_insecure_mx_policy from smtp_tls_security_level
will delay the Postfix 3.10.0 stable release by another day, but it
would be worth it.
Wietse
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]