Skip to content

[CERT-Bund#2023092728001552] Vulnerability report regarding postfix and postfix-mta-sts-resolver #105

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
gsauthof opened this issue Apr 21, 2024 · 1 comment
Assignees
Labels
enhancement New feature or request

Comments

@gsauthof
Copy link
Contributor

I came across some traces of a CERT-Bund vulnerability report:

From postfix-devel  Tue Oct 24 11:58:20 2023
From: Wietse Venema via Postfix-devel <postfix-devel () postfix ! org>
Date: Tue, 24 Oct 2023 11:58:20 +0000
To: postfix-devel
Subject: [pfx-dev] Re: [CERT-Bund#2023092728001552] Vulnerability report regarding postfix and postfix-mta-sts-resolver
Message-Id: <4SF9cx74KKzJrP1 () spike ! porcupine ! org>
X-MARC-Message: https://marc.info/?l=postfix-devel&m=169814870008296

see also:

Since I found nothing in the issues/pull-requests tracker/readme I'm wondering whether they managed to contact you and whether current postfix-meta-sts-resolver is vulnerable (if it was a valid report, in the first place).

@gsauthof gsauthof added the enhancement New feature or request label Apr 21, 2024
@Snawoot
Copy link
Owner

Snawoot commented Apr 21, 2024

Hello!

Yes, they've contacted me. They reported two things:

  • MTA-STS Overrides DANE #67
  • Issue with check of domain name in subject certificate. postfix-mta-sts-resolver tells which domains names are allowed by MTA-STS, but it can't ensure domain name in certificate matches exactly to one which Postfix requested dialing SMTP TLS session. IMO it's a minor inconsistency with MTA-STS RFC, but hardly a security issue: if attacker is able to use certificate validating any MTA-STS authorized domain, security is already broken at this point.

@Snawoot Snawoot closed this as completed Apr 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants