On Thu, Feb 18, 2016 at 08:12:36PM -0500, Wietse Venema wrote:

> Should tafile be documented under smtp_tls_policy_maps?

Yes, I noticed the omission today, the attribute is covered under:

   http://www.postfix.org/TLS_README.html#client_tls_policy

   verify
       Mandatory server certificate verification. Mail is delivered
       only if the TLS handshake succeeds, if the remote SMTP server
       certificate can be validated (not expired or revoked, and
       signed by a trusted Certification Authority), and if the
       server certificate name matches the optional "match" attribute
       (or the main.cf smtp_tls_verify_cert_match parameter value
       when no optional "match" attribute is specified). With
       Postfix >= 2.11 the "tafile" attribute optionally modifies
       trust chain verification in the same manner as the
       "smtp_tls_trust_anchor_file" parameter.  The "tafile"
       attribute may be specified multiple times to load multiple
       trust-anchor files.

   secure
       Secure certificate verification. Mail is delivered only if
       the TLS handshake succeeds, if the remote SMTP server
       certificate can be validated (not expired or revoked, and
       signed by a trusted Certification Authority), and if the
       server certificate name matches the optional "match" attribute
       (or the main.cf smtp_tls_secure_cert_match parameter value
       when no optional "match" attribute is specified). With
       Postfix >= 2.11 the "tafile" attribute optionally modifies
       trust chain verification in the same manner as the
       "smtp_tls_trust_anchor_file" parameter. The "tafile" attribute
       may be specified multiple times to load multiple trust-anchor
       files.

but the text in postconf(5) is different:

   verify
       Mandatory TLS verification. At this security level, DNS MX
       lookups are trusted to be secure enough, and the name verified
       in the server certificate is usually obtained indirectly
       via unauthenticated DNS MX lookups. The optional "match"
       attribute overrides the main.cf smtp_tls_verify_cert_match
       parameter. In the policy table, multiple match patterns and
       strategies must be separated by colons. In practice explicit
       control over matching is more common with the "secure"
       policy, described below.

   secure
       Secure-channel TLS. At this security level, DNS MX lookups,
       though potentially used to determine the candidate next-hop
       gateway IP addresses, are not trusted to be secure enough
       for TLS peername verification. Instead, the default name
       verified in the server certificate is obtained directly from
       the next-hop, or is explicitly specified via the optional
       match attribute which overrides the main.cf
       smtp_tls_secure_cert_match parameter. In the policy table,
       multiple match patterns and strategies must be separated by
       colons. The match attribute is most useful when multiple
       domains are supported by common server, the policy entries
       for additional domains specify matching rules for the primary
       domain certificate. While transport table overrides routing
       the secondary domains to the primary nexthop also allow
       secure verification, they risk delivery to the wrong
       destination when domains change hands or are re-assigned to
       new gateways. With the "match" attribute approach, routing
       is not perturbed, and mail is deferred if verification of
       a new MX host fails.

So these descriptions need to be reconciled.

-- 
        Viktor.

Reply via email to