[prev in list] [next in list] [prev in thread] [next in thread] 

List:       postfix-users
Subject:    Re: SSL communication between MTAs
From:       Viktor Dukhovni <postfix-users () dukhovni ! org>
Date:       2019-08-16 6:53:23
Message-ID: 0E1D635E-1225-478D-AC79-0A042751F003 () dukhovni ! org
[Download RAW message or body]

> On Aug 16, 2019, at 1:29 AM, Viktor Dukhovni <postfix-users@dukhovni.org> wrote:
> 
> enable DANE outbound:
> 
>   http://www.postfix.org/TLS_README.html#client_tls_dane
> 
>   main.cf:
> 	smtp_dns_support_level = dnssec
> 	smtp_tls_security_level = dane
> 
>   /etc/resolv.conf
> 	# A validating *local* resolver
> 	nameserver 127.0.0.1

I got an off-list suggestion to stress the importance of the
validating resolver being *local* to the Postfix server.  In
addition to improved performance when the DNS cache is local,
this avoids potential MiTM attacks that "forge" the AD bit or
data of a DNS response.

The Postfix DANE code fully trusts answers from the configured
resolvers, and only provides meaningful resistance to active
attacks when traffic between the validating resolver and Postfix
is not vulnerable to modification in transit.

And with distant validating resolvers you have no control over
the timing and reliability of potential changes in their validation
logic.  For example, 8.8.8.8 and 8.8.4.4 returned incorrect AD
bits for some domains for a few days this past week (now believed
resolved).

Bottom line, only trust local resolvers you deploy, configure
*correctly* and test.

-- 
	Viktor.

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic