On Wed, Sep 03, 2014 at 02:25:06PM +0200, Robert Sander wrote:

> Sep  3 14:18:47 mailout1 postfix/smtp[30772]: warning: DANE TLSA lookup 
> problem: Host or domain name not found. Name service error for 
> name=_25._tcp.mail2.clarion-hotels.cz type=TLSA: Host not found, try again

> $ host -t tlsa _25._tcp.mail2.clarion-hotels.cz
> _25._tcp.mail2.clarion-hotels.cz is an alias for clarion-hotels.cz.

I don't see a CNAME, I get SERVFAIL:

    $ dig +ad +noall +comment +ans +auth -t tlsa 
_25._tcp.mail2.clarion-hotels.cz
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 8100
    ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

Which is consistent with the above log entry.   The problem
is generic to all sub-domains of the MX hostname in question:

    $ dig +ad +noall +comment +ans +auth -t a fail.mail2.clarion-hotels.cz
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 11576
    ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

> I believe that Postfix stumbles across the unexpected
> CNAME record, that does not have a TLSA record.

No, DNSSEC signature problems are detected in the validating
resolver, not in Postfix.  Disabling validation returns the following,
which presumably is either wrong or exposes a bug in unbound.

    $ dig +cd +dnssec +noall +comment +ans +auth -t tlsa 
fail.mail2.clarion-hotels.cz
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63426
    ;; flags: qr rd ra cd; QUERY: 1, ANSWER: 2, AUTHORITY: 6, ADDITIONAL: 1

    ;; OPT PSEUDOSECTION:
    ; EDNS: version: 0, flags: do; udp: 4096
    ;; ANSWER SECTION:
    fail.mail2.clarion-hotels.cz. 1430 IN       CNAME   clarion-hotels.cz.
    fail.mail2.clarion-hotels.cz. 1430 IN       RRSIG   CNAME 5 2 1800 
20140924121306 20140825121306 13077 clarion-hotels.cz. 
M8OQ5fcnOYPX2XXvV9Cgefkjv2AHYFLAMeDfUpBuSk1PBFG6s/4tMSLb 
C/0r72TOjZupOHe5vizyzamAcE6m7dA4tlXGlWkTapf95lKFRokqjQow 
eRESgmZSS/b43jgxLv/+FRsu3rYnz77j3cC413qBn0PDDKLbepk0YEZC yTk=

    ;; AUTHORITY SECTION:
    mail2.clarion-hotels.cz. 2759       IN      NSEC    clarion-hotels.cz. A 
RRSIG NSEC
    mail2.clarion-hotels.cz. 2759       IN      RRSIG   NSEC 5 3 3600 
20140924121306 20140825121306 13077 clarion-hotels.cz. 
WlUUsb1EqhP5mUfJ5DXpxvVs7Tw4h5802WCwXy4B2NByTbj3SfurhbV7 
HBxPFA/I5OR4VkbWsFr7LlOpb93xRmEXt98afdrzzrKIgMIoNHu4oHDe 
ykeuV/7epjuHOxpZUKtfhe48ktKZ0NRievAyCUxiJA8evpgifR7AKKqS yGA=
    clarion-hotels.cz.  2716    IN      SOA     ns.forpsi.net. 
admin.forpsi.com. 2014082501 3600 1800 2592000 3600
    clarion-hotels.cz.  2716    IN      RRSIG   SOA 5 2 3600 20140924121306 
20140825121306 13077 clarion-hotels.cz. 
F5DurWWNlg9zQrvFMQrdNNjH58Zv/TTVBQSOtslMYlwXWp3ZcJGCC1Ra 
veDuerwFv5dQUsBQIJpQc5eZmyXXH8YA5rOLBK1x19ej0hl1T3yi3pG6 
4SJFCrzSIIFVKzX7nKDtfnFK/Zq3X6db7oh9I+gpNnyojuDCccuQNwov kQw=
    clarion-hotels.cz.  2716    IN      NSEC    *.clarion-hotels.cz. A NS SOA 
MX RRSIG NSEC DNSKEY
    clarion-hotels.cz.  2716    IN      RRSIG   NSEC 5 2 3600 20140924121306 
20140825121306 13077 clarion-hotels.cz. 
OOeXzp0449w2dXf6zdvnidH69d27+9kPH6fJP9CK+coXuMiZ7WwheIn8 
qZrhqYPu9xrnpgmYYkOeuaWDq2b+7rxKzzJTw/0hAjjO8vKRMr2sPyNi 
CpM2btBTM2FrKZvFJZegMYafo37QH05cg47hXAjEiyEYCMlJfNmMx+AN le8=

The problem is perhaps with the wildcard record in the authority
section, which seems to wildcard NS SOA and DNSKEY, making the
wildcard CNAMES look like singed sub-zones.

> Is there anything we can do?

You can disable "dane" for this domain.

    tls-policy:
        clarion-hotels.cz may

The wildcard in question is unwise, it should instead be a CNAME to

        *.clarion-hotels.cz IN CNAME www.clarion-hotels.cz.

with "www.clarion-hotels.cz" having only A/AAAA records, and no
NS, DNSKEY, ...  There may be other issues.

-- 
        Viktor.

Reply via email to