From af2ead5af8216520ca4e079b625b287fe435600d Mon Sep 17 00:00:00 2001
From: Wietse Venema
At the "fingerprint" security level, with parameter setting -"smtp_tls_enable_rpk = yes" or with "enable_rpk = yes" in a policy entry, -server authentication based on certificate fingerprints becomes more -fragile. Even if the server private key and certificate remain -unchanged, the remote SMTP server will fail fingerprint authentication -(won't match the configured list of fingerprints) when it starts sending -a raw public key instead of a certificate, after its TLS implementation -is updated with raw public key support. Therefore, DO NOT -enable raw public keys to remote destinations authenticated by server -certificate fingerprints. You should enable raw public keys -only for servers matched via their public key fingerprint.
- -At the "dane" security level, the Postfix SMTP client -always ignores the parameter setting smtp_tls_enable_rpk or the -enable_rpk policy attribute. When all valid TLSA records specify -only server public keys (no certificates) and the local TLS +"smtp_tls_enable_rpk = yes" or with "enable_rpk = yes" in a policy +entry, server authentication based on certificate fingerprints +becomes more fragile. Even if the server private key and certificate +remain unchanged, the remote SMTP server will fail fingerprint +authentication (won't match the configured list of fingerprints) +when it starts sending a raw public key instead of a certificate, +after its TLS implementation is updated with raw public key support. +Therefore, DO NOT enable raw public keys to remote destinations +authenticated by server certificate fingerprints. You should +enable raw public keys only for servers matched via their public +key fingerprint.
+ +At the "verify" and "secure" security levels, the Postfix +SMTP client always ignores the parameter setting smtp_tls_enable_rpk +or the enable_rpk policy attribute.
+ +At the opportunistic "dane" security level, the Postfix +SMTP client ignores the parameter setting smtp_tls_enable_rpk or +the enable_rpk policy attribute (but it will respect them when it +falls back to the "may" or "encrypt" level). When all valid TLSA +records specify only server public keys (no certificates) and the +local TLS implementation supports raw public keys, the client will +indicate in the TLS handshake that it prefers to receive a raw +public key, but it will still accept a public key certificate.
+ +At the mandatory "dane-only" security level, the Postfix +SMTP client always ignores the parameter setting smtp_tls_enable_rpk +or the enable_rpk policy attribute. When all valid TLSA records +specify only server public keys (no certificates) and the local TLS implementation supports raw public keys, the client will indicate in the TLS handshake that it prefers to receive a raw public key, but it will still accept a public key certificate.
diff --git a/postfix/man/man5/postconf.5 b/postfix/man/man5/postconf.5 index f8de63cf6..e373344ac 100644 --- a/postfix/man/man5/postconf.5 +++ b/postfix/man/man5/postconf.5 @@ -8597,21 +8597,35 @@ the TLS handshake that it prefers to receive a raw server public key, but it will still accept a server public key certificate. .IP \(bu At the "fingerprint" security level, with parameter setting -"smtp_tls_enable_rpk = yes" or with "enable_rpk = yes" in a policy entry, -server authentication based on certificate fingerprints becomes more -fragile. Even if the server private key and certificate remain -unchanged, the remote SMTP server will fail fingerprint authentication -(won't match the configured list of fingerprints) when it starts sending -a raw public key instead of a certificate, after its TLS implementation -is updated with raw public key support. Therefore, \fBDO NOT\fR -enable raw public keys to remote destinations authenticated by server -\fBcertificate\fR fingerprints. You should enable raw public keys -only for servers matched via their public key fingerprint. -.IP \(bu -At the "dane" security level, the Postfix SMTP client -always ignores the parameter setting smtp_tls_enable_rpk or the -enable_rpk policy attribute. When all valid TLSA records specify -only server public keys (no certificates) and the local TLS +"smtp_tls_enable_rpk = yes" or with "enable_rpk = yes" in a policy +entry, server authentication based on certificate fingerprints +becomes more fragile. Even if the server private key and certificate +remain unchanged, the remote SMTP server will fail fingerprint +authentication (won't match the configured list of fingerprints) +when it starts sending a raw public key instead of a certificate, +after its TLS implementation is updated with raw public key support. +Therefore, \fBDO NOT\fR enable raw public keys to remote destinations +authenticated by server \fBcertificate\fR fingerprints. You should +enable raw public keys only for servers matched via their public +key fingerprint. +.IP \(bu +At the "verify" and "secure" security levels, the Postfix +SMTP client always ignores the parameter setting smtp_tls_enable_rpk +or the enable_rpk policy attribute. +.IP \(bu +At the opportunistic "dane" security level, the Postfix +SMTP client ignores the parameter setting smtp_tls_enable_rpk or +the enable_rpk policy attribute (but it will respect them when it +falls back to the "may" or "encrypt" level). When all valid TLSA +records specify only server public keys (no certificates) and the +local TLS implementation supports raw public keys, the client will +indicate in the TLS handshake that it prefers to receive a raw +public key, but it will still accept a public key certificate. +.IP \(bu +At the mandatory "dane\-only" security level, the Postfix +SMTP client always ignores the parameter setting smtp_tls_enable_rpk +or the enable_rpk policy attribute. When all valid TLSA records +specify only server public keys (no certificates) and the local TLS implementation supports raw public keys, the client will indicate in the TLS handshake that it prefers to receive a raw public key, but it will still accept a public key certificate. diff --git a/postfix/proto/postconf.proto b/postfix/proto/postconf.proto index 1b60a9765..071d61e1c 100644 --- a/postfix/proto/postconf.proto +++ b/postfix/proto/postconf.proto @@ -18711,21 +18711,35 @@ the TLS handshake that it prefers to receive a raw server public key, but it will still accept a server public key certificate.At the "fingerprint" security level, with parameter setting -"smtp_tls_enable_rpk = yes" or with "enable_rpk = yes" in a policy entry, -server authentication based on certificate fingerprints becomes more -fragile. Even if the server private key and certificate remain -unchanged, the remote SMTP server will fail fingerprint authentication -(won't match the configured list of fingerprints) when it starts sending -a raw public key instead of a certificate, after its TLS implementation -is updated with raw public key support. Therefore, DO NOT -enable raw public keys to remote destinations authenticated by server -certificate fingerprints. You should enable raw public keys -only for servers matched via their public key fingerprint.
- -At the "dane" security level, the Postfix SMTP client -always ignores the parameter setting smtp_tls_enable_rpk or the -enable_rpk policy attribute. When all valid TLSA records specify -only server public keys (no certificates) and the local TLS +"smtp_tls_enable_rpk = yes" or with "enable_rpk = yes" in a policy +entry, server authentication based on certificate fingerprints +becomes more fragile. Even if the server private key and certificate +remain unchanged, the remote SMTP server will fail fingerprint +authentication (won't match the configured list of fingerprints) +when it starts sending a raw public key instead of a certificate, +after its TLS implementation is updated with raw public key support. +Therefore, DO NOT enable raw public keys to remote destinations +authenticated by server certificate fingerprints. You should +enable raw public keys only for servers matched via their public +key fingerprint.
+ +At the "verify" and "secure" security levels, the Postfix +SMTP client always ignores the parameter setting smtp_tls_enable_rpk +or the enable_rpk policy attribute.
+ +At the opportunistic "dane" security level, the Postfix +SMTP client ignores the parameter setting smtp_tls_enable_rpk or +the enable_rpk policy attribute (but it will respect them when it +falls back to the "may" or "encrypt" level). When all valid TLSA +records specify only server public keys (no certificates) and the +local TLS implementation supports raw public keys, the client will +indicate in the TLS handshake that it prefers to receive a raw +public key, but it will still accept a public key certificate.
+ +At the mandatory "dane-only" security level, the Postfix +SMTP client always ignores the parameter setting smtp_tls_enable_rpk +or the enable_rpk policy attribute. When all valid TLSA records +specify only server public keys (no certificates) and the local TLS implementation supports raw public keys, the client will indicate in the TLS handshake that it prefers to receive a raw public key, but it will still accept a public key certificate.
diff --git a/postfix/src/global/mail_version.h b/postfix/src/global/mail_version.h index de4dce043..559191da0 100644 --- a/postfix/src/global/mail_version.h +++ b/postfix/src/global/mail_version.h @@ -20,7 +20,7 @@ * Patches change both the patchlevel and the release date. Snapshots have no * patchlevel; they change the release date only. */ -#define MAIL_RELEASE_DATE "20230807" +#define MAIL_RELEASE_DATE "20230808" #define MAIL_VERSION_NUMBER "3.9" #ifdef SNAPSHOT -- 2.47.3