TLS-Policy override
This guide should only be used by experienced administrators
This guide is intended for experienced administrators who need to adjust TLS policies for specific domains or IP addresses.
Improper changes to TLS settings can lead to delivery problems or insecure connections.
Background¶
Since the mailcow update in September 2025, mailcow also checks TLS policies of the recipient for outgoing SMTP connections.
Previously, this check applied only to incoming emails or to domains where the feature was explicitly enabled.
In rare cases this can cause emails to no longer be delivered — for example, if a recipient domain publishes faulty or invalid TLSA records (DANE).
Because Postfix (and thus mailcow) treats these records as authoritative according to RFC 7672, delivery will be refused in such cases.
If you still want to deliver emails to such affected recipients — for example as a workaround for faulty TLSA records — you can set an override policy for the respective domain via the TLS policy management.
Note that this deliberately bypasses security checks and should only be used temporarily or with proper documentation.
Procedure¶
-
Log in:
Sign in to the mailcow web interface as an administrator. -
Navigation:
Open Email > Configuration. -
Open TLS Policies:
Switch to the TLS Policies tab. -
Add entry:
Click Add TLS policy entry. -
Set target:
Enter the affected domain or IP address in the Target field for which the policy should apply (e.g.example.com
). -
Select policy:
In the Policy dropdown choose one of the following options:none
– TLS will not be used, even if the target server offers it.may
– TLS will be used if available, but is not required.encrypt
– TLS is required, but certificates are not verified.verify
– TLS is required and the server certificate is verified.secure
– TLS is required; certificate and hostname must be valid.dane
– TLS according to DANE policies, falls back to opportunistic TLS without a TLSA record.dane-only
– TLS only via valid DANE/TLSA records, no fallback.fingerprint
– TLS is required; the certificate must match a stored fingerprint.
Example:
If a domain has faulty TLSA entries, you can temporarily choosemay
orencrypt
to allow delivery. -
Optional parameters:
In the Parameters field you can specify additional Postfix options, e.g.:protocols=!SSLv2,!SSLv3
to disable legacy protocols.Separate parameters from each other with a blank line.
-
Activate policy:
Enable the Active option so the policy is applied. -
Save:
Click Add to create and activate the policy.
The policy is now active.
A restart of mailcow or Postfix is not required — the change takes effect immediately.
Example use cases¶
Situation | Recommended policy | Description |
---|---|---|
Target domain has invalid TLSA records | may |
Opportunistic TLS to allow delivery despite faulty DANE entries. |
Internal test systems without valid certificates | encrypt |
Enforces encryption without certificate verification. |
Partner domain with correctly configured DANE | dane |
Secure delivery via DNSSEC-validated TLSA records. (mailcow default when recipient domain is compatible) |
High-security environment with known certificates | fingerprint |
Explicit certificate pinning for maximum control. |
Note
As soon as faulty TLSA records or certificate issues on the recipient side are resolved, you should remove the temporarily set policy or reset it to the default value to preserve the integrity of the TLS security model.