On Fri, Nov 14, 2014 at 10:01:02PM +0100, Tom Hendrikx wrote:
> One notable difference between posttls-finger and postfix (as
> described in the documentation) is that postfix would only use the
> TLSA record for deciding on a "verified" connection when the resolver
> is running on localhost, while posttls-finger also accepts dnssec data
> from a remote resolver (I run unbound in a different VM on the same
> piece of hardware).
Postfix will use (and wisely or otherwise trust) whatever resolver
is in /etc/resolv.conf. If that's remote, and subject to MiTM
attacks, that your problem. If you have a secure IPsec tunnel to
a trusted resolver, feel free to use it. You can even use remote
resolvers over untrusted networks, and expose yourself to active
attacks.
> My guess is that I would actually need to send a mail to someone that
> has TLSA records published in order to test my postfix setup, and then
> check the local logs.
The posttls-finger and Postfix code exercise very similar verification
logic. You can use "sendmail -bv" to test without actually delivering
the mail.
/usr/sbin/sendmail -bv [email protected]
then check the logs.
> Am I wrong in understanding the docs, or is there actually a
> difference in the restrictions on resolver usage between
> posttls-finger and postfix. If so, would it be useful to keep these in
> sync, or add a switch to posttls-finger to enforce this behaviour for
> testing purposes?
There is no difference. Both use the same DNS library in the same
way.
> Finally, does anybody have an email sinkhole available on a DANE
> enabled server where I can send some test messages?:)
The "sendmail -bv" command probes a server without sending mail.
--
Viktor.