mirror of
https://github.com/mjl-/mox.git
synced 2025-07-12 17:04:39 +03:00
when suggesting CAA records for a domain, suggest variants that bind to the account id and with validation methods used by mox
should prevent potential mitm attacks. especially when done close to the machine itself (where a http/tls challenge is intercepted to get a valid certificate), as seen on the internet last month.
This commit is contained in:
2
testdata/integration/moxacmepebble.sh
vendored
2
testdata/integration/moxacmepebble.sh
vendored
@ -25,7 +25,7 @@ sed -i -e 's/moxtest1@mox1.example: nil/moxtest1@mox1.example: nil\n\t\t\tpostfi
|
||||
|
||||
(
|
||||
cat /integration/example.zone;
|
||||
sed -n '/^;/,/CAA /p' output.txt |
|
||||
sed -n '/^;/,/will be suggested/p' output.txt |
|
||||
# allow sending from postfix for mox1.example.
|
||||
sed 's/mox1.example. *TXT "v=spf1 mx ~all"/mox1.example. TXT "v=spf1 mx ip4:172.28.1.70 ~all"/'
|
||||
) >/integration/example-integration.zone
|
||||
|
Reference in New Issue
Block a user