On Fri, 2015-01-30 at 05:35 +0000, Viktor Dukhovni wrote:
> On Fri, Jan 30, 2015 at 05:27:59AM +0000, srach wrote:
> 
> > >> ?1. Know for sure that the relay mail comes from the #1 server.? A added
> > >> header can be made fake so I look for a better way that is not possible 
> > >> to
> > >> fake.
> >
> > > Restrict access to the non-default port via TLS client certs or SASL.
> 
> And I often find it easier to configure client certs, no SASL or
> PAM configuration nightmares. :-)
> 
> 
> > With the SASL opportunity is it still true that Postfix with the Dovecot 
> > SASL 
> > where I am building Postfix with
> > 
> > -DUSE_SASL_AUTH -DDEF_SERVER_SASL_TYPE="dovecot"
> > 
> > is not possible to use as SASL client but only Cyrus?
> 
> Indeed Dovecot only provides the (complex) server-side of SASL.
> The client side still requires Cyrus SASL support, so you can build
> with both.
> 
> > With the TLS client cert opportunity for authenticating my Postfix relay as 
> > client to the other mail server that is receiving the relay mail I have 
> > some 
> > small confusion.
> 
>       -o smtpd_tls_security_level=encrypt
>       -o smtpd_tls_ask_ccert=yes
>       # If all clients need a cert on this port
>       # -o smtpd_tls_req_ccert=yes
> 
> on port 587 or whatever you choose for the relay-to-relay service
> port.
> 
> > When I make the self-signed client certificate for my Postfix relay 
> > instance 
> > I have read that I must give it the email address of the 'login user' 
> > exactly 
> > so it can be a match?
> 
> Nothing of the sort.  Postfix access control between the relays
> will be by "fingerprint".  Just set:
> 
>     # Default, backwards-compatible, md5 "looks bad" in audits:
>     # SHA-1 still has plenty of 2nd-preimage resistance:
>     #
>     smtpd_tls_fingerprint_digest = sha1
> 
> > I do not know which user I must give?? Becuase there 
> > will be mail for many different users that will be relayed?
> 
> I'd have said something about that if it were relevant.
> 

Here is a quick write up with recipient relay addresses using a SMTP
transport with an MD5 hash, somewhat like above.  You could do it with
relay domains also I suppose and with most transports I would imagine..
It is a very dirty method if MTA TLS CERT verification is your single
point of security however.
http://myspew.com/projects/postfix-tls-fingerprints-for-mta-to-mta-identification

Andy

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to