On Fri, Jun 28, 2024 at 07:50:09PM -0400, Jim P. via mailop wrote: > I just received back a bounce that was delivered to my @live.com > address, the one that sent the test message a few days ago. Here is > what it contains:
Reading your first post brought to mind the recent report of potential issues at Microsoft's outbound servers with "too many" TLSA records (more than ~12). I was looking at your TLSA RRset (14 TLSA records): _25._tcp.mx1.domainmail.net. IN CNAME _tlsa.domainmail.net. _tlsa.domainmail.net. IN TLSA 2 1 1 bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270 _tlsa.domainmail.net. IN TLSA 2 1 1 3586d4ecf070578cbd27aedce20b964e48bc149faeb9dad72f46b857869172b8 _tlsa.domainmail.net. IN TLSA 2 1 1 d016e1fe311948aca64f2de44ce86c9a51ca041df6103bb52a88eb3f761f57d7 _tlsa.domainmail.net. IN TLSA 2 1 1 025490860b498ab73c6a12f27a49ad5fe230fafe3ac8f6112c9b7d0aad46941d _tlsa.domainmail.net. IN TLSA 2 1 1 2bbad93ab5c79279ec121507f272cbe0c6647a3aae52e22f388afab426b4adba _tlsa.domainmail.net. IN TLSA 2 1 1 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d _tlsa.domainmail.net. IN TLSA 2 1 1 6ddac18698f7f1f7e1c69b9bce420d974ac6f94ca8b2c761701623f99c767dc7 _tlsa.domainmail.net. IN TLSA 2 1 1 e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03 _tlsa.domainmail.net. IN TLSA 2 1 1 f1647a5ee3efac54c892e930584fe47979b7acd1c76c1271bca1c5076d869888 _tlsa.domainmail.net. IN TLSA 2 1 1 276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10 _tlsa.domainmail.net. IN TLSA 2 1 1 885bf0572252c6741dc9a52f5044487fef2a93b811cdedfad7624cc283b7cdd5 _tlsa.domainmail.net. IN TLSA 2 1 1 919c0df7a787b597ed056ace654b1de9c0387acf349f73734a4fd7b58cf612a4 _tlsa.domainmail.net. IN TLSA 2 1 1 cbbc559b44d524d6a132bdac672744da3407f12aae5d5f722c5f6c7913871c75 _tlsa.domainmail.net. IN TLSA 2 1 1 f1440a9b76e1e41e53a4cb461329bf6337b419726be513e42e19f1c691c5d4b2 when you also now reported: > 6/28/2024 8:04:14 PM - Server at PH8PR20MB5100.namprd20.prod.outlook.com > returned '550 5.7.324 dnssec-invalid: Destination domain returned > invalid DNSSEC records(450 4.7.324 dnssec-invalid: Destination domain > returned invalid DNSSEC records)' Which rather suggests that indeed they're failing to handle (perfectly valid), but somehow problematic on their end TLSA RRsets. The response from your primary authoritative server looks fine: $ dig +nocmd +nocrypto +nocl +nottl +norecur +dnssec -t tlsa @a.ns.domainmail.net _25._tcp.mx1.domainmail.net. ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45146 ;; flags: qr aa; QUERY: 1, ANSWER: 17, AUTHORITY: 5, ADDITIONAL: 2 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1232 ; COOKIE: 702b161494dac35201000000667f5348fd60182dcd37095a (good) ;; QUESTION SECTION: ;_25._tcp.mx1.domainmail.net. IN TLSA ;; ANSWER SECTION: _25._tcp.mx1.domainmail.net. CNAME _tlsa.domainmail.net. _25._tcp.mx1.domainmail.net. RRSIG CNAME 13 5 604800 20240721161048 20240621154118 17100 domainmail.net. [omitted] _tlsa.domainmail.net. TLSA 2 1 1 919C0DF7A787B597ED056ACE654B1DE9C0387ACF349F73734A4FD7B5 8CF612A4 _tlsa.domainmail.net. TLSA 2 1 1 6DDAC18698F7F1F7E1C69B9BCE420D974AC6F94CA8B2C761701623F9 9C767DC7 _tlsa.domainmail.net. TLSA 2 1 1 025490860B498AB73C6A12F27A49AD5FE230FAFE3AC8F6112C9B7D0A AD46941D _tlsa.domainmail.net. TLSA 2 1 1 2BBAD93AB5C79279EC121507F272CBE0C6647A3AAE52E22F388AFAB4 26B4ADBA _tlsa.domainmail.net. TLSA 2 1 1 CBBC559B44D524D6A132BDAC672744DA3407F12AAE5D5F722C5F6C79 13871C75 _tlsa.domainmail.net. TLSA 2 1 1 3586D4ECF070578CBD27AEDCE20B964E48BC149FAEB9DAD72F46B857 869172B8 _tlsa.domainmail.net. TLSA 2 1 1 885BF0572252C6741DC9A52F5044487FEF2A93B811CDEDFAD7624CC2 83B7CDD5 _tlsa.domainmail.net. TLSA 2 1 1 8D02536C887482BC34FF54E41D2BA659BF85B341A0A20AFADB5813DC FBCF286D _tlsa.domainmail.net. TLSA 2 1 1 F1647A5EE3EFAC54C892E930584FE47979B7ACD1C76C1271BCA1C507 6D869888 _tlsa.domainmail.net. TLSA 2 1 1 276FE8A8C4EC7611565BF9FCE6DCACE9BE320C1B5BEA27596B220407 1ED04F10 _tlsa.domainmail.net. TLSA 2 1 1 E5545E211347241891C554A03934CDE9B749664A59D26D615FE58F77 990F2D03 _tlsa.domainmail.net. TLSA 2 1 1 BD936E72B212EF6F773102C6B77D38F94297322EFC25396BC3279422 E0C89270 _tlsa.domainmail.net. TLSA 2 1 1 D016E1FE311948ACA64F2DE44CE86C9A51CA041DF6103BB52A88EB3F 761F57D7 _tlsa.domainmail.net. TLSA 2 1 1 F1440A9B76E1E41E53A4CB461329BF6337B419726BE513E42E19F1C6 91C5D4B2 _tlsa.domainmail.net. RRSIG TLSA 13 3 604800 20240726183256 20240626182946 17100 domainmail.net. [omitted] ;; AUTHORITY SECTION: domainmail.net. NS a.ns.domainmail.org. domainmail.net. NS a.ns.domainmail.net. domainmail.net. NS b.ns.domainmail.org. domainmail.net. NS b.ns.domainmail.net. domainmail.net. RRSIG NS 13 2 604800 20240714020811 20240625142458 17100 domainmail.net. [omitted] ;; ADDITIONAL SECTION: a.ns.domainmail.net. A 13.39.252.35 ;; Query time: 262 msec ;; SERVER: 13.39.252.35#53(a.ns.domainmail.net) (UDP) ;; WHEN: Sat Jun 29 10:20:56 AEST 2024 ;; MSG SIZE rcvd: 1220 And DNSViz reports no issues: https://dnsviz.net/d/_25._tcp.mx1.domainmail.net/Zn9TqA/dnssec/ That said, do you really need all 14 records? R3 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d R4 e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03 -- E1 276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10 E2 bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270 -- R10 2bbad93ab5c79279ec121507f272cbe0c6647a3aae52e22f388afab426b4adba R11 6ddac18698f7f1f7e1c69b9bce420d974ac6f94ca8b2c761701623f99c767dc7 R12 919c0df7a787b597ed056ace654b1de9c0387acf349f73734a4fd7b58cf612a4 R13 025490860b498ab73c6a12f27a49ad5fe230fafe3ac8f6112c9b7d0aad46941d R14 f1647a5ee3efac54c892e930584fe47979b7acd1c76c1271bca1c5076d869888 --- E5 3586d4ecf070578cbd27aedce20b964e48bc149faeb9dad72f46b857869172b8 E6 d016e1fe311948aca64f2de44ce86c9a51ca041df6103bb52a88eb3f761f57d7 E7 cbbc559b44d524d6a132bdac672744da3407f12aae5d5f722c5f6c7913871c75 E8 885bf0572252c6741dc9a52f5044487fef2a93b811cdedfad7624cc283b7cdd5 E9 f1440a9b76e1e41e53a4cb461329bf6337b419726be513e42e19f1c691c5d4b2 The MX host in question has RSA-only certs, and the "E*" TLSA records are redundant. If you force cert renewal, you'll be switched from R3 to one of R10/R11, and can then drop the R3/R4 records too. If that helps, someone with the right contacts to escalate this, should try to get through to Microsoft to fix what is I think a serious enough interoperability problem. -- Viktor. _______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop