Am Freitag, 22. November 2019, 23:08:39 CET schrieb Ralph Seichter:
> * Lars Kollstedt:
> > is there a clean way to optionally present a client certificate to a
> > Postfix MX [...]
>
> I hope I don't misinterpret your question here.
[...]
> However, I don't see you using relay_clientcerts=/path/to/clientcerts
> anywhere. That would be required on the SMTP server side to actually
> look up certificate fingerprints.
Hi Ralph,
at first thank you for the reply.
But I'm not talking about doing relay control via client certificates. This is
just a setup I know and I don't want to break, if someone does it on the same
host and port as his MX.
We've someone running
smtpd_tls_received_header=yes
smtpd_tls_ask_ccert = yes
smtpd_tls_CApath=/etc/ssl/certs
on his Postfix MX servers in our nearer environment, but I don't want to
maintain a list of all his domains to present the client certificate there.
But I understand the wish to also cryptographically verify this direction. So
I would like to make his servers logging the verification of the client
certificate "I've crypographically sure got the mail from that host."
At the moment it's a single MX server name on the other end but a bunch of
domains. And since the transport map is working on domain names prior of the
MX lookup (at least as far as I know) this is not an option.
Something mapping the transport method the after MX lookup was done would
solve this, for my current usecase. With the single server configured this way
on the other end.
But it's of course not worth breaking the mail delivery or TLS to other mail
recipients where relay control is done this way on port 25 of the MX server,
in a way that causes problems if an unexpected client certificate is
presented.
So the question was if there is a clean way, to configure a client certficate
that is tried to present, and left away in case of failure. Unfortunately this
will need a second connection, when tried without the other side to signal
what kind of verification is done. And it's not possible to determine the
reason of failure, that's the reason of my worries about greylisting.
The more I'm thinking about this seems to be more a protocol extension for
future but anything that can be implemented by configuration - without
breaking anything, yet.
Kind regards,
Lars
--
Lars Kollstedt
Telefon: +49 6151 16-71027
E-Mail: [email protected]
man-da.de GmbH
Dolivostraße 11
64293 Darmstadt
Sitz der Gesellschaft: Darmstadt
Amtsgericht Darmstadt, HRB 9484
Geschäftsführer: Andreas Ebert