John Fawcett via Postfix-users:
> I don't really see much use for a "may" default for lmtp over tcp. The 
> logic that makes "may" a good default for smtp where there is no 
> guarantee of end to end encryption, but better be encrypted if you can, 
> doesn't fit the lmtp use cases. "may" is going to be useful in the 
> context where people accidentally configure ssl on the lmtp server and 
> then postfix can take advantage of it. But also then, if it accidently 
> breaks, it will downgrade without warning, maybe fine for smtp, not so 
> good for lmtp. This is one case where I think the system admin needs to 
> make a choice. I'd go with the empty default and then leave the choice 
> to the good sense of the system admin.

I have reverted the change in lmtp_tls_security_level back to the
Postfix 3.10 default. In Postfix 3.11.0 and Postfix 3.12, the
lmtp_tls_security_level default will be like it was in Postfix 3.10.

        Wietse
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to