Daemon which provides TLS client policy for Postfix via socketmap, according to domain MTA-STS policy
Project description
postfix-mta-sts-resolver
Daemon which provides TLS client policy for Postfix via socketmap, according to domain MTA-STS policy. Current support of RFC8461 is limited - daemon lacks some minor features:
- Proactive policy fetch
- Fetch error reporting
- Fetch ratelimit
Dependencies
- Python 3.5.3+ (see "Systems without Python 3.5+" below if you haven't one)
- aiodns
- aiohttp
- pynetstring
- PyYAML
- (optional) uvloop
- pycares>=2.3.0
All dependency packages installed automatically if this package is installed via pip.
Installation
Method 1. System-wide install from PyPI (recommended for humans)
Run:
sudo python3 -m pip install postfix-mta-sts-resolver
Package scripts shall be available in standard executable locations upon completion.
Method 2. System-wide install from project source
Run in project directory:
sudo python3 -m pip install .
Package scripts shall be available in standard executable locations upon completion.
Method 3. Running from project directory without installation
Installing dependencies:
sudo python3 -m pip install -r requirements.txt
Now scripts can be run right in source directory.
Method 4. Install into virtualenv
Common installation notes
See also contrib/README.md for RHEL/OEL/Centos notes.
See contrib/postfix-mta-sts.service for example of systemd unit file suitable to run daemon under systemd control.
pip user install
All pip invocations can be run with --user
option of pip
installer. In this case superuser privileges are not required and package(s) are getting installed into user home directory. Usually, script executables will appear in ~/.local/bin
.
Running
This package provides two executables available after installation in respective locations.
mta-sts-query
mta-sts-query
is a command line tool which fetches and outputs domain MTA-STS policies. Intended to be used for debug purposes.
Synopsis:
$ mta-sts-query --help
usage: mta-sts-query [-h] [-v {debug,info,warn,error,fatal}]
domain [known_version]
positional arguments:
domain domain to fetch MTA-STS policy from
known_version latest known version (default: None)
optional arguments:
-h, --help show this help message and exit
-v {debug,info,warn,error,fatal}, --verbosity {debug,info,warn,error,fatal}
logging verbosity (default: warn)
mta-sts-daemon
mta-sts-daemon
is a daemon which provides external TLS policy for Postfix SMTP client via socketmap interface.
You may find useful systemd unit file to run daemon in contrib/postfix-mta-sts.service.
Synopsis:
$ mta-sts-daemon --help
usage: mta-sts-daemon [-h] [-v {debug,info,warn,error,fatal}] [-c FILE]
[--disable-uvloop]
optional arguments:
-h, --help show this help message and exit
-v {debug,info,warn,error,fatal}, --verbosity {debug,info,warn,error,fatal}
logging verbosity (default: info)
-c FILE, --config FILE
config file location (default: /etc/postfix/mta-sts-
daemon.yml)
--disable-uvloop do not use uvloop even if it is available (default:
False)
MTA-STS Daemon configuration
See example config in source code directory. Default config location is: /etc/postfix/mta-sts-daemon.yml
, but it can be overriden with command line option -c FILE
.
All options is self-explanatory, only exception is strict_testing
option. If set to true
, STS policy will be enforced even if domain announces testing
MTA-STS mode. Useful for premature incorporation of MTA-STS against domains hesistating to go enforce
. Please use with caution.
Postfix configuration
Add line like
smtp_tls_policy_maps = socketmap:inet:127.0.0.1:8461:postfix
into your main.cf
config and reload Postfix.
Operability check
Assuming default configuration. Following command:
/usr/sbin/postmap -q dismail.de socketmap:inet:127.0.0.1:8461:postfix
should return something like:
secure match=mx1.dismail.de
Postfix log should show Verified TLS connection established to ...
instead of Trusted TLS connection established to ...
when mail is getting sent to MTA-STS-enabled domain.
Special cases of deployment
Systems without Python 3.5+
Some people may find convenient to install latest python from source into /opt
directory. This way you can have separate python installation not interferring with system packages by any means. Download latest python source from python.org, unpack and run in unpacked source directory:
./configure --prefix=/opt --enable-optimizations && make -j $[ $(nproc) + 1 ] && make test && sudo make install
Python binaries will be available in /opt/bin
, including pip3
. You may install postfix-mta-sts-resolver
using /opt/bin/pip3
without interference with any system packages:
sudo /opt/bin/pip3 install postfix-mta-sts-resolver
Executable files of postfix-mta-sts-resolver
will be available in /opt/bin/mta-sts-query
and /opt/bin/mta-sts-daemon
Building virtualenv
Run make
in project directory in order to build virtualenv. As result of it, new directory venv
shall appear. venv
contains interpreter and all required dependencies, i.e. encloses package with depencencies in separate environment. It is possible to specify alternative path where virtualenv directory shall be placed. Specify VENV variable for make
command. Example:
make VENV=~/postfix-mta-sts-resolver
Such virtual environment can be moved to another machine of similar type (as far python interpreter is compatible with new environment). If virtualenv is placed into same location on new machine, application can be runned this way:
venv/bin/mta-sts-daemon
Otherwise, some hacks required. First option - explicitly call virtualenv interpreter:
venv/bin/python venv/bin/mta-sts-daemon
Second option - specify new path in shebang of scripts installed in virtualenv. It is recommended to build virtualenv at same location which app shall occupy on target system.
Credits
Inspired by this forum thread.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file postfix_mta_sts_resolver-0.2.4.tar.gz
.
File metadata
- Download URL: postfix_mta_sts_resolver-0.2.4.tar.gz
- Upload date:
- Size: 10.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.18.4 setuptools/38.5.1 requests-toolbelt/0.8.0 tqdm/4.19.5 CPython/2.7.13
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7a2f7ec35c71a0e22203f8862ee40a785cebb58834212aa7610954fb5f34a87a |
|
MD5 | 1adf2ab3c58aa3ac2acc861654ea0319 |
|
BLAKE2b-256 | d2b15e59df6edc6ec258aa93b9eece7d436a487f95e8fe68a20273eee8a1d796 |
File details
Details for the file postfix_mta_sts_resolver-0.2.4-py3-none-any.whl
.
File metadata
- Download URL: postfix_mta_sts_resolver-0.2.4-py3-none-any.whl
- Upload date:
- Size: 12.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.18.4 setuptools/38.5.1 requests-toolbelt/0.8.0 tqdm/4.19.5 CPython/2.7.13
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ec6b084881ea65949c1d883cf75fc775d357b0bc2768daa5a3a928965fb505ca |
|
MD5 | 263cbddb53ba96780fe7d6ea5785e250 |
|
BLAKE2b-256 | 433d6024686f9fb752efd5417a22e0d4407a17b44eb1a99d8330e536b0d46ddd |