Christophe Kalt via Postfix-users:
> > > # postconf smtp_dns_support_level
> > > smtp_dns_support_level =
> > > # postconf -nf | egrep \^smtp
> > > smtp_destination_concurrency_limit = 1
> > > smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
> > > smtp_tls_connection_reuse = yes
> > > smtp_tls_security_level = may
> >
> > Thanks, that's helpful. Turns out that the change in the default value
> > of insecure MX TLS policy had unanticipated implications. To be fixed
> > in the next set of patch releases. :-(
>
> Glad to hear you figured this out. I take it that the warnings are harmless
> and safe to ignore here?
If you build from source, below is a 'simple' patch. This prevents
the Postfix SMTP client from ignoring that DNSSEC is disabled. This
is likely to go into the stable releases.
Wietse
diff '--exclude=man' '--exclude=html' '--exclude=README_FILES'
'--exclude=INSTALL' '--exclude=.indent.pro' -r -ur
/var/tmp/postfix-3.11-20250217/src/smtp/smtp_addr.c ./src/smtp/smtp_addr.c
--- /var/tmp/postfix-3.11-20250217/src/smtp/smtp_addr.c 2024-10-10
18:15:24.000000000 -0400
+++ ./src/smtp/smtp_addr.c 2025-02-21 09:52:27.610195070 -0500
@@ -299,7 +299,8 @@
if (mx_names->dnssec_valid)
res_opt = RES_USE_DNSSEC;
#ifdef USE_TLS
- else if (smtp_tls_insecure_mx_policy > TLS_LEV_MAY)
+ else if (smtp_tls_insecure_mx_policy > TLS_LEV_MAY
+ && smtp_dns_support == SMTP_DNS_DNSSEC)
res_opt = RES_USE_DNSSEC;
#endif
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]