Apply suggestions from code review

This commit is contained in:
Brennan Kinney 2023-10-24 16:38:26 +13:00 committed by GitHub
parent 09b9a535d9
commit 16dc9af6c6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 21 additions and 21 deletions

View File

@ -2,26 +2,27 @@
title: 'Advanced | MTA-STS'
---
MTA-STS is an optional mechanism for a domain to signal support for
STARTTLS. It can be used to prevent man-in-the-middle-attacks hiding the
feature to force mail servers to send outgoing emails as plain text.
MTA-STS is an alternative to DANE without the need of DNSSEC.
MTA-STS is an optional mechanism for a domain to signal support for STARTTLS.
MTA-STS is supported by some of the biggest mail providers like Google Mail
and Outlook.
- It can be used to prevent man-in-the-middle-attacks from hiding STARTTLS support that would force DMS to send outbound mail through an insecure connection.
- MTA-STS is an alternative to DANE without the need of DNSSEC.
- MTA-STS is supported by some of the biggest mail providers like Google Mail and Outlook.
## Supporting MTA-STS for outgoing mails
## Supporting MTA-STS for outbound mail
This is enabled by setting `ENABLE_MTA_STS=1` [](../environment.md#enable_mta_sts)
in the environment.
Enable this feature via the ENV setting [`ENABLE_MTA_STS=1`](../environment.md#enable_mta_sts).
!!! warning
!!! warning "If you have configured DANE"
MTA-STS will by default override DANE if both are in used by a domain.
This can be partially addressed by configuring a dane-only policy resolver
before the MTA-STS entry in smtp_tls_policy_maps. See [the postfix-mta-sts-resolver documentation](https://github.com/Snawoot/postfix-mta-sts-resolver#warning-mta-sts-policy-overrides-dane-tls-authentication)
for further details.
Enabling MTA-STS will by default override DANE if both are configured for a domain.
## Supporting MTA-STS for incoming mails
This can be partially addressed by configuring a dane-only policy resolver before the MTA-STS entry in `smtp_tls_policy_maps`. See the [`postfix-mta-sts-resolver` documentation][postfix-mta-sts-resolver::dane] for further details.
[postfix-mta-sts-resolver::dane]: https://github.com/Snawoot/postfix-mta-sts-resolver#warning-mta-sts-policy-overrides-dane-tls-authentication
## Supporting MTA-STS for inbound mail
While this feature in DMS supports ensuring STARTTLS is used when mail is sent to another mail server, you may setup similar for mail servers sending mail to DMS.
This requires configuring your DNS and hosting the MTA-STS policy file via a webserver. A good introduction can be found on [dmarcian.com](https://dmarcian.com/mta-sts/).
A good introduction can be found on [dmarcian.com](https://dmarcian.com/mta-sts/).

View File

@ -110,7 +110,7 @@ This enables DNS block lists in _Postscreen_. If you want to know which lists we
##### ENABLE_MTA_STS
Enables MTA-STS for outgoing mails.
Enables MTA-STS support for outbound mail.
- **0** => Disabled
- 1 => Enabled

View File

@ -346,9 +346,8 @@ POSTFIX_REJECT_UNKNOWN_CLIENT_HOSTNAME=0
# Note: More details at http://www.postfix.org/postconf.5.html#inet_protocols
POSTFIX_INET_PROTOCOLS=all
# If enabled, STARTTLS support is enforced for outgoing mails to domains
# with MTA-STS records like Google Mail.
# This can prevent man-in-the-middle that hide the STARTTLS feature.
# Enables MTA-STS support for outbound mail.
# More details: https://docker-mailserver.github.io/docker-mailserver/latest/config/advanced/mail-mta-sts/
# - **0** ==> MTA-STS disabled
# - 1 => MTA-STS enabled
ENABLE_MTA_STS=0

View File

@ -4,5 +4,5 @@
function _setup_mta_sts() {
_log 'trace' 'Adding MTA-STS lookup to the Postfix TLS policy map'
postconf 'smtp_tls_policy_maps = socketmap:inet:127.0.0.1:8461:postfix'
_add_to_or_update_postfix_main smtp_tls_policy_maps 'socketmap:inet:127.0.0.1:8461:postfix'
}