File: mta-sts-daemon.1.adoc

package info (click to toggle)
postfix-mta-sts-resolver 1.5.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 536 kB
  • sloc: python: 3,069; sh: 226; makefile: 47
file content (74 lines) | stat: -rw-r--r-- 1,981 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
= mta-sts-daemon(1)
:doctype: manpage
:manmanual: mta-sts-daemon
:mansource: postfix-mta-sts-resolver

== Name

mta-sts-daemon - provide MTA-STS policy to Postfix as policy map

== Synopsis

*mta-sts-daemon* [_OPTION_]...

== Description

This daemon opens a socket where Postfix can query and retrieve the MTA-STS
policy for a domain.  The configuration file is described in
*mta-sts-daemon.yml*(5).

MTA-STS, specified in RFC 8461 [0], is a security standard for email servers.
When a site configures MTA-STS, other mail servers can require the
successful authentication of that site when forwarding mail there.

== Options

*-h, --help*::
  show a help message and exit

*-v, --verbosity* _VERBOSITY_::
  set log verbosity level: _debug_, _info_ (default), _warn_, _error_, or
  _fatal_.
*-c, --config* _FILE_::
  config file location (default: _/etc/mta-sts-daemon.yml_)

*-g, --group* _GROUP_::
  change eGID to this group (default: _none_)

*-l, --logfile* _FILE_::
  log file location (default: _none_)

*-p, --pidfile* _PIDFILE_::
  name of the file to write the current pid to (default: _none_)

*-u, --user* _USER_::
  change eUID to this user (default: _none_)


*--disable-uvloop*::
  do not use uvloop even if it is available (default: enabled if available)

== Examples

Configure Postfix in _/etc/postfix/main.cf_:

 smtp_tls_policy_maps = socketmap:inet:127.0.0.1:8461:postfix
 smtp_tls_CApath = /etc/ssl/certs/

Reload Postfix.  Then verify it works:

*/usr/sbin/postmap -q dismail.de socketmap:inet:127.0.0.1:8461:postfix*

This configuration overrides DANE TLS authentication. If you wish to meet the
requirement of RFC 8461, section 2, you should list a DANE policy resolver (or 
a static lookup table for domains known to implement both MTA-STS & DANE) before
mta-sts-daemon in smtp_tls_policy_maps.

== See also

*mta-sts-query*(1), *mta-sts-daemon.yml*(5)

== Notes

0.::
  *SMTP MTA Strict Transport Security (MTA-STS)*: https://tools.ietf.org/html/rfc8461