RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1688389 - Update Postfix to 3.3.2 to add TLSv1.3-related features
Summary: Update Postfix to 3.3.2 to add TLSv1.3-related features
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: postfix
Version: 8.0
Hardware: Unspecified
OS: Unspecified
urgent
urgent
Target Milestone: rc
: 8.0
Assignee: Jaroslav Škarvada
QA Contact: Patrik Moško
Prerana Sharma
URL:
Whiteboard:
: 1746927 1904544 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-03-13 16:38 UTC by Luc de Louw
Modified: 2024-06-13 22:04 UTC (History)
11 users (show)

Fixed In Version: postfix-3.5.8-1.el8
Doc Type: Enhancement
Doc Text:
.Difference in default `postfix-3.5.8` behavior For better RHEL-8 backward compatibility, the behavior of the `postfix-3.5.8` update differs from the default upstream `postfix-3.5.8` behavior. For the default upstream `postfix-3.5.8` behavior, run the following commands: `# postconf info_log_address_format=external` `# postconf smtpd_discard_ehlo_keywords=` `# postconf rhel_ipv6_normalize=yes` For details, see the `/usr/share/doc/postfix/README-RedHat.txt` file. If the incompatible functionalities are not used or RHEL-8 backward compatibility is the priority, no steps are necessary.
Clone Of:
Environment:
Last Closed: 2021-05-18 15:03:43 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2021:1664 0 None None None 2021-05-18 15:03:54 UTC

Comment 1 Luc de Louw 2019-03-13 16:39:41 UTC
Please also see http://www.postfix.org/announcements/postfix-3.3.2.html

Comment 2 Jaroslav Škarvada 2019-03-13 17:04:32 UTC
It works with the TLSv1.3 as is, but it's missing some features like:
- option to selectively disable TLSv1.3
- TLSv1.3 specific attributes in Postfix logging and in Postfix "Received:" message headers

$ rpm -q postfix
postfix-3.3.1-8.el8.x86_64

$ openssl s_client -connect localhost:25 -starttls smtp
...
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
...

Comment 5 Tomáš Hozza 2020-03-27 13:28:56 UTC
*** Bug 1746927 has been marked as a duplicate of this bug. ***

Comment 8 Robert Scheck 2020-10-11 16:08:23 UTC
Cross-filed case 02774219 at the Red Hat customer portal, because we would not like to end up again with incomplete TLSv<latest> support in Postfix in a RHEL release, as it already happened with bug #1885530 before.

Comment 41 Jaroslav Škarvada 2020-11-24 17:09:27 UTC
For better RHEL-8 backward compatibility, behavior of this postfix-3.5.8 update differs from the default upstream postfix-3.5.8 behavior. For the full upstream postfix-3.5.8 behavior the following commands needs to be run:

# postconf info_log_address_format=external
# postconf smtpd_discard_ehlo_keywords=
# postconf rhel_ipv6_normalize=yes

Description of the above steps:

1. Change the configuration option 'info_log_address_format' to 'external'.
In RHEL-8 it's by default set to 'internal' to mitigate [Incompat 20191109].

2. Change the configuration option 'smtpd_discard_ehlo_keywords' to ''.
In RHEL-8 it's by default set to 'chunking' to mitigate [Incompat 20180826].

3. Add RHEL-8 specific configuration option 'rhel_ipv6_normalize' and set it
to 'yes'. In RHEL-8 this option was added to mitigate [Incompat 20190427].

Also if the tlsproxy is in use please note that the tlsproxy daemon now requires a zero process limit to avoid performance loss under load. This setting is already in our example configuration master.cf file since at least RHEL-8.0. In case it was customized, change the process_limit value to 0, by e.g.:

# postconf -F tlsproxy/unix/process_limit=0
# systemctl restart postfix

This is to mitigate [Incompat 20180701].

If the incompatible functionalities are not used or RHEL-8 backward compatibility is priority, no steps are necessary.

Details from the upstream RELEASE_NOTES:

[Incompat 20191109]
Postfix daemon processes now log the from= and
to= addresses in external (quoted) form in non-debug logging (info,
warning, etc.).  This means that when an address localpart contains
spaces or other special characters, the localpart will be quoted,
for example:

    from=<"name with spaces"@example.com>

Older Postfix versions would log the internal (unquoted) form:

    from=<name with spaces>

The external and internal forms are identical for the vast majority
of email addresses that contain no spaces or other special characters
in the localpart.

Specify "info_log_address_format = internal" for backwards
compatibility.

The logging in external form is consistent with the address form
that Postfix 3.2 and later prefer for table lookups. It is therefore
the more useful form for non-debug logging.

[Incompat 20180826]
The Postfix SMTP server announces CHUNKING (BDAT
command) by default. In the unlikely case that this breaks some
important remote SMTP client, disable the feature as follows:

/etc/postfix/main.cf:
    # The logging alternative:
    smtpd_discard_ehlo_keywords = chunking
    # The non-logging alternative:
    smtpd_discard_ehlo_keywords = chunking, silent_discard

See BDAT_README for more.

[Incompat 20190427]
Postfix now normalizes IP addresses received
with XCLIENT, XFORWARD, or with the HaProxy protocol, for consistency
with direct connections to Postfix. This may change the appearance
of logging, and the way that check_client_access will match subnets
of an IPv6 address.

[Incompat 20180701]
To avoid performance loss under load, the
tlsproxy(8) daemon now requires a zero process limit in master.cf
(this setting is provided with the default master.cf file). By
default, a tlsproxy(8) process will retire after several hours.

To set the tlsproxy process limit to zero:

# postconf -F tlsproxy/unix/process_limit=0
# postfix reload

Comment 42 Robert Scheck 2020-11-26 21:19:16 UTC
Based on tests with postfix-3.5.8-1.el8.x86_64 (as provided by GSS via case 02774219), our expectations regarding complete TLSv1.3 support are satisfied - thank you!

Comment 43 Jaroslav Škarvada 2020-12-07 09:38:27 UTC
*** Bug 1904544 has been marked as a duplicate of this bug. ***

Comment 44 Jaroslav Škarvada 2020-12-08 15:45:31 UTC
*** Bug 1905484 has been marked as a duplicate of this bug. ***

Comment 49 errata-xmlrpc 2021-05-18 15:03:43 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (postfix bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:1664


Note You need to log in before you can comment on or make changes to this bug.