On Tue, Apr 19, 2016 at 04:23:08PM +0000, Viktor Dukhovni wrote: > > >In my survey of 12000 DANE TLSA-enabled domains 545 are using LE > > >certificates. > > > > Is this compared to the ~9600 in December last year? That would be 25% > > increase in your survey? > > Yes, but some of that is due to new methods to find candidate > domains, not just more domains found with the same methods.
For example, yesterday I decided to try a new way to find candidate domains, and that scan is now about 30% done. I've found 1052 new DANE TLSA domains, the vast majority of which are hosted by the usual 3 suspects: 804 transip.nl 123 udmedia.de 35 nederhost.net This scan will also double my corpus of identified domains that have DNSSEC for both the domain and at least of the primary MX hosts (if the domain has MX records). That number will rise from ~130,000 to ~260,000. While the total DANE domain count will then be around 15000. A more interesting number from December that grows independently of my prowess at finding largely obscure hosted domains, is the number of domains that appear on Google's email transparency report (are actually observed by Gmail to send or receive a non-negligible quantity of email). That number was 25 in October at the MAAWG conference, 30 in December, and is 50 today. It will soon be 53, because yesterday the gmx.{de,net,com} domains got DNSSEC signed, quite likely so as to publish TLSA records in a matter of days if this matches the recent observations with web.de. Another interesting metric, (for which I don't have numbers from December) is that the MX hosts of the ~12000 domains lie in ~1640 distinct delegated domains. The current survey expansion (at ~30% progress) has found 7 more. This metric measures deployment of DANE by server operators not domain owners, and so counts the top 3 hosting providers as as just 3 deployments, not 7100. If any of this encourages some readers of this list to deploy DNSSEC+DANE, I urge you to make sure that: * You have publically discoverable email contact addresses either via "whois", or the "mrname" of DNS SOA record. * You monitor your servers, making sure that their TLSA records match the deployed certificate chain and that with usage DANE-TA(2) the server certificate hostname matches the TLSA base domain" of the TLSA record and is not expired. * When using a public CA for your certs, consider publishing both a "2 1 1" TLSA record matching the issuing CA public key and a "3 1 1" record matching your server public key. Make sure to include the CA certificate in your server certificate chain file. * When not using a public CA for your certs, consider publishing both a "2 0 1" TLSA record matching the public key of a private issuing CA that you create for this purpose, as well as the "3 1 1" record matching your server public key. Make sure to include the CA certificate in your server certificate chain file. See https://www.ietf.org/mail-archive/web/uta/current/msg01498.html for the rationale. This approach makes it easier to do key rotation and reduces the risk of authentication failure. Enough on this topic for a while I think. I'll post another update in October, unless something dramatic happens before then. -- Viktor.