On Mon, Jun 06, 2016 at 03:58:51PM +0200, Alexandre Ellert wrote: > I�ve juste enable DANE and https://dane.sys4.de <https://dane.sys4.de/> > is green when I test my domain numeezy.com <http://numeezy.com/>. Also > postfix SMTP client says "Verified TLS connection established to > mail-in-1.numeezy.com[188.165.154.163]:25: TLSv1.2 with cipher > ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)" > > Maybe some DANE expert here can definitely confirm that my setup is sane.
Yes, your DANE TLSA records match for both the primary and secondary MX hosts. You've also *not* made the mistake of using the same certificate for both the primary and secondary MX hosts, thereby risking an outage of both when you replace a single certificate. And you're using "3 1 1" records which are stable when you renew your certificate with the same private key. So overall, quite good, however you can do even better, see: https://www.ietf.org/mail-archive/web/uta/current/msg01498.html based on which I would strongly recommend: _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 1 cf43899685886c77e6e86d6a063c957df7858e7ea1bc3896b464fc6502685b48 _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 1 1 d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166 _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 1 8aee8995fca9c9cb89d0057f40b42cdcf23b1abc037681acd74af8c68b12a41e _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 1 1 d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166 The above is based on the below observed DNS records, certificate chain and associated matching TLSA records: numeezy.com. IN MX 1 mail-in-1.numeezy.com. numeezy.fr. IN MX 1 mail-in-1.numeezy.com. medialta.com. IN MX 1 mail-in-1.numeezy.com. medialta.fr. IN MX 1 mail-in-1.numeezy.com. medialta.eu. IN MX 1 mail-in-1.numeezy.com. mail-in-1.numeezy.com. IN A 188.165.154.163 ; passed _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 1 cf43899685886c77e6e86d6a063c957df7858e7ea1bc3896b464fc6502685b48 ; passed at depth=0 ; ; Depth: actual=0, wire=0 ; Subject = CN=mail-in-1.numeezy.com,O=Numeezy SARL,L=PARIS,ST=Ile-de-France,C=FR ; Issuer = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification Authority,O=StartCom Ltd.,C=IL ; Valid from 2016-05-17T12:16:30Z until 2019-05-17T12:16:30Z ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 1 cf43899685886c77e6e86d6a063c957df7858e7ea1bc3896b464fc6502685b48 ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 0 1 50f417dbdab3677847eb0107d363044f4166eed1bb333daf6320d6b8daefb70e ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 2 5061dc02e6df14ad409acb5c2bb4992f80e1a5a1cc53faa5d81bd42d644010260e9a94747599c49df6b576981a6c6bf02b86764758c2bf4008ae6387f558a7c4 ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 0 2 b7b3d2036ad1d77d6c187e1f3fd9de28fc3f74af725a48c242bebc8eb1c4af56b06747bb1622cb27ef696f8741d09066d640768f9caa944a8981da174752a058 ; ; Depth: actual=1, wire=1 ; Match = mail-in-1.numeezy.com ; Subject = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification Authority,O=StartCom Ltd.,C=IL ; Issuer = CN=StartCom Certification Authority,OU=Secure Digital Certificate Signing,O=StartCom Ltd.,C=IL ; Valid from 2015-12-16T01:00:05Z until 2030-12-16T01:00:05Z ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 1 1 d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166 ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 0 1 ea4e5d2b9c99560f13dd094b8121a623bfdd902038dfd6d772ce32ffabec094d ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 1 2 d26da4f0733b1f4af61f9db3c0e5bd6e379022e41038cb2cf7f38e273bdcaf98e0afd9b119e0fd85b090afec3d46020cbaee0158015666360ccc73418a0d3794 ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 0 2 6a4bd383b21927f44f09263819d2917edbd8a8ea58d97dac48c26a1e88e5c7062691366f79300705da4b68b5bf9153477241f7603faf4ac03d1cde69abaef328 numeezy.com. IN MX 5 mail-in-2.numeezy.com. numeezy.fr. IN MX 5 mail-in-2.numeezy.com. medialta.com. IN MX 5 mail-in-2.numeezy.com. medialta.fr. IN MX 5 mail-in-2.numeezy.com. medialta.eu. IN MX 5 mail-in-2.numeezy.com. mail-in-2.numeezy.com. IN A 37.59.203.174 ; passed _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 1 8aee8995fca9c9cb89d0057f40b42cdcf23b1abc037681acd74af8c68b12a41e ; passed at depth=0 ; ; Depth: actual=0, wire=0 ; Subject = CN=mail-in-2.numeezy.com,O=Numeezy SARL,L=PARIS,ST=Ile-de-France,C=FR ; Issuer = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification Authority,O=StartCom Ltd.,C=IL ; Valid from 2016-05-17T12:39:52Z until 2019-05-17T12:39:52Z ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 1 8aee8995fca9c9cb89d0057f40b42cdcf23b1abc037681acd74af8c68b12a41e ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 0 1 c49354b6b553fed27d8b66aa42a7be4f18d8979e5c6260bd62d174051fb58b3a ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 2 7292aba36d879109a7ef70143ca3dc499c7774b693f4e6f9392ccb8b365b084cf583ee2533d4987582d8e8626c7f4d894826f3df0e686c07c201a5af08020b86 ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 0 2 cd703c0fd747873a29d6467dc6e18fc7334a94918e59d9c6a9ba7320f1c8aea8473fe8d1edac9f3e2e7d6099eb17231832c5cc013500340be22c3830e91a21a2 ; ; Depth: actual=1, wire=1 ; Match = mail-in-2.numeezy.com ; Subject = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification Authority,O=StartCom Ltd.,C=IL ; Issuer = CN=StartCom Certification Authority,OU=Secure Digital Certificate Signing,O=StartCom Ltd.,C=IL ; Valid from 2015-12-16T01:00:05Z until 2030-12-16T01:00:05Z ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 1 1 d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166 ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 0 1 ea4e5d2b9c99560f13dd094b8121a623bfdd902038dfd6d772ce32ffabec094d ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 1 2 d26da4f0733b1f4af61f9db3c0e5bd6e379022e41038cb2cf7f38e273bdcaf98e0afd9b119e0fd85b090afec3d46020cbaee0158015666360ccc73418a0d3794 ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 0 2 6a4bd383b21927f44f09263819d2917edbd8a8ea58d97dac48c26a1e88e5c7062691366f79300705da4b68b5bf9153477241f7603faf4ac03d1cde69abaef328 You have three year certificates, that may well be "too long", in 3 years time you'll forget you have DANE TLSA records that need to change when you change your private/public key pair. Also after three years you'll probably want a new private key. Carefully document the correct certificate rollover procedure and required DNS updates in README files in the directories where the certificates are kept and reference them in the main.cf file or other configuration files that use those certificates. -- Viktor.