On Tue, Aug 15, 2023 at 11:33:08AM -0400, Wietse Venema via Postfix-users wrote:

> With that, the condition evaluates to:
> 
>     1: session->tls_context == 0                   true
>     2: state->tls->level == TLS_LEV_MAY            presumably true
>     3: PREACTIVE_DELAY >= var_min_backoff_time     false
>     4: !HAVE_SASL_CREDENTIALS                      ?
> 
> [...]
> 
> Condition 3 may need more nuance. The code is OK for non-probe
> messages; it prefers to retry later with TLS, over immediately
> falling back to plaintext. When the later retry also fails in the
> TLS handhake, then Postfix will immediately fall back to plaintext.
> 
> However, probes don't retry, so maybe we should skip condition 3
> for probes.

That's my instinct also.  Waiting out transient glitches by retrying on
the next delivery attempt is not an option for probes.  And probes don't
leak message content in the clear, nor even the full envelope, just a
single sender or recipient.

I am surprised it took this long for the impedance mismatch to get
noticed.  We've had TLS retry on next delivery for close to two decades,
and recipient verification for a similar timeframe.

So it seems that legitimate domains (from which one actually cares to
receive mail) with persistently broken STARTTTLS rarely send mail to
Postfix sites with sender verification enabled.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to