On Tue, Jul 15, 2014 at 07:17:47AM +0000, Eray Aslan wrote:
> Nice. I am guessing the motivation is making dane easier to deploy,
> especially for early adopters, by decreasing the fall out in case the
> receiver domain makes a mistake in his/her settings. Thanks.
Something like that, but potentially also useful with "secure" and
especially "fingerprint", where remote configuration changes make
authentication fragile.
> > smtp_tls_audit_template (default: empty)
> >
> > Optional template for tls audit logging at the completion of each
> > mes-
> > sage data transfer. If empty (the default setting) no TLS audit
> > log
> > entries are generated.
>
> Flexibility is nice. Let's not lose it but my guess is having a/some
> predefined template(s) -none, low, high?- will make it easier to
> maintain. Otherwise, I am afraid it will just be copy and paste from
> some web page and parsing logs will be harder than it needs to be.
> There will be too many varations around to use a standart script.
I mostly see two variants, one with spki digests, and one without.
If you can suggest specific combinations, please do. I am not
worried about parsers, all the logged fields are of the ", key=value"
variety. The "tlsaudit:" prefix should perhaps be a fixed element of
the tls audit log (when enabled).
> A general discussion for postfix logging might be in order as well.
> This parameter will set the expectations for (future?) log
> configuration.
There could be a lot more templates I guess, not sure whether this
is worth the trouble. As for the TLS audit log, another option is
perhaps to log this as part of the delivery-agent per-recipient
log entry, but then it is repeated lots of times, and absent for
recipients deferred by a non-final MX.
The current log entry is written for any transaction which gets
past EHLO/STARTTLS/AUTH to attempt to deliver an envelope. (XFORWARD,
MAIL FROM, ...). There is no TLS audit logging when SMTP session
setup fails.
--
Viktor.