Am 24.02.2014 19:03, schrieb Dirk Stöcker:
> On Mon, 24 Feb 2014, Viktor Dukhovni wrote:
> 
>>> I don't want to have a perfection box which can't communicate with
>>> the rest of the world, but something which helps with todays
>>> internet.
>>
>> Nonsense.  Patrick Koetter's .de domain is DNSSEC signed.  His
>> mailserver has TLSA records.  Enabling DNSSEC does not prevent you
>> from communicating with the rest of the world.  Furthermore, you
>> can enable DNSSEC validation in your resolver before your own domain
>> is signed.  The two are independent.
> 
> So what do you think really - How long will it take until 10% of all
> mail hosts use DANE/TLSA? Wouldn't it be a good idea to at least
> increase security (even a little bit) for what we have now? I'd be happy
> when a higher percentage would support TLS at all.
> 
> But you din't answer my question: What harm would it do, when the checks
> implemented already to verify certs and domain names and maybe TLS
> protocol quality are also executed for "Opportunistic TLS" and the
> results printed in the log?
> 
> Would it really be bad when the line
> 
> Feb 24 18:56:04 merkur postfix/smtp[7701]: Trusted TLS connection
> established to mail.stoecker.eu[2a01:4f8:d13:3800::1:5]:25: TLSv1 with
> cipher ECDHE-RSA-AES256-SHA (256/256 bits)
> 
> contains a note that the server certificate of the connection actually
> also matched the domain name written there.
> 
>>> My Registrar said today:
>>> "Sorry, currently it is not possible to use DNSSec for domains
>>> registered here."
>>
>> Vote with your feet.  I'm transferring my domains to a registrar
>> with better DNSSEC support (and incidentally lower price).
> 
> I live in the "hightech country" Germany. Here a 16/1MB DSL line is
> extreme highspeed internet, IPV4 is state of the art. I can only dream
> of finding providers for more reliable Internet. DNSSEC is actually the
> lowest of my problems.
> 
>>> And then I need to hope that users start to use that information,
>>> because all this work is completely useless until 100% deployed. My
>>> 100 years guess aren't so bad I think. Very unlikely, that this
>>> approach will work.
>>
>> No, DANE secures SMTP transport between publishing servers and
>> validating clients regardless of what everyone else is doing.  The
>> adoption model is incremental.
> 
> Is there a test server I can use to verify correct function? It does not
> sound like a good idea to send some test mails to a server without a
> permission to do so.
> 
> Even if it seems I can't get more security for my own server or get
> better information out of postfix to evaluate the "low quality TLS"
> connections it at least would be interesting to setup that support for
> sending. Maybe in the next year there even will be an email to one of
> these servers.
> 
> Ciao

Hi Dirk

Be sure dnssec will spread fast at some point if massive attacks on dns
servers will rise more and more.

see

https://sys4.de/de/blog/2013/10/14/dns-fragment-angriffe-zeit-fur-dnssec/



Best Regards
MfG Robert Schetterer

-- 
[*] sys4 AG

http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München

Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein

Reply via email to