John: > > - DNSSEC: a man-in-the-middle hardened means of publishing DNS data. > > > > - DANE: an IETF working group to develop standards for using DNSSEC > > to publish authentication information (public keys and the like) > > that binds DNS names to corresponding credentials. > > > > http://datatracker.ietf.org/wg/dane/charter/ > > > > - TLSA: one of the DNS record types developed by the DANE working group > > that publishes TLS server keys in DNS. TLSA records are defined in > > RFC 6698. > > > > http://tools.ietf.org/html/rfc6698 > > http://datatracker.ietf.org/doc/rfc6698/ > > > > So, neither DANE nor TLSA encrypt your data, TLS does that. DANE ... > Does this do anything to solve "Man in the middle" who presents an > apparently valid cert (usually generated on the fly)? Because I thought > the only way to detect this was to compare the finger print of the key > presented with the know finger print.
With at least one mode of DANE operation, the SMTP server's TLS public-(key or certificate) fingerprint is in the TLSA DNS record. Will that be sufficient for your purposes? > Just a thought, maybe there is a more appropriate forum/mail list to > discuss this on, as this is not strictly Postfix related? I suggest reading the IETF mailing list and documents first. Hear it from the horse's mouth, as it were. Wietse