On Mon, Jun 06, 2016 at 03:58:51PM +0200, Alexandre Ellert wrote:

> I�ve juste enable DANE and https://dane.sys4.de <https://dane.sys4.de/>
> is green when I test my domain numeezy.com <http://numeezy.com/>.  Also
> postfix SMTP client says "Verified TLS connection established to
> mail-in-1.numeezy.com[188.165.154.163]:25: TLSv1.2 with cipher
> ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)"
> 
> Maybe some DANE expert here can definitely confirm that my setup is sane.

Yes, your DANE TLSA records match for both the primary and secondary
MX hosts.  You've also *not* made the mistake of using the same
certificate for both the primary and secondary MX hosts, thereby
risking an outage of both when you replace a single certificate.
And you're using "3 1 1" records which are stable when you renew
your certificate with the same private key.  So overall, quite
good, however you can do even better, see:

    https://www.ietf.org/mail-archive/web/uta/current/msg01498.html

based on which I would strongly recommend:

    _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 1 
cf43899685886c77e6e86d6a063c957df7858e7ea1bc3896b464fc6502685b48
    _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 1 1 
d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166

    _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 1 
8aee8995fca9c9cb89d0057f40b42cdcf23b1abc037681acd74af8c68b12a41e
    _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 1 1 
d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166

The above is based on the below observed DNS records, certificate
chain and associated matching TLSA records:

    numeezy.com. IN MX 1 mail-in-1.numeezy.com.
    numeezy.fr. IN MX 1 mail-in-1.numeezy.com.
    medialta.com. IN MX 1 mail-in-1.numeezy.com.
    medialta.fr. IN MX 1 mail-in-1.numeezy.com.
    medialta.eu. IN MX 1 mail-in-1.numeezy.com.
    mail-in-1.numeezy.com. IN A 188.165.154.163 ; passed
    _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 1 
cf43899685886c77e6e86d6a063c957df7858e7ea1bc3896b464fc6502685b48 ; passed at 
depth=0
    ;
    ;    Depth: actual=0, wire=0
    ;    Subject = CN=mail-in-1.numeezy.com,O=Numeezy 
SARL,L=PARIS,ST=Ile-de-France,C=FR
    ;    Issuer = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification 
Authority,O=StartCom Ltd.,C=IL
    ;    Valid from 2016-05-17T12:16:30Z until 2019-05-17T12:16:30Z
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 1 
cf43899685886c77e6e86d6a063c957df7858e7ea1bc3896b464fc6502685b48
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 0 1 
50f417dbdab3677847eb0107d363044f4166eed1bb333daf6320d6b8daefb70e
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 1 2 
5061dc02e6df14ad409acb5c2bb4992f80e1a5a1cc53faa5d81bd42d644010260e9a94747599c49df6b576981a6c6bf02b86764758c2bf4008ae6387f558a7c4
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 3 0 2 
b7b3d2036ad1d77d6c187e1f3fd9de28fc3f74af725a48c242bebc8eb1c4af56b06747bb1622cb27ef696f8741d09066d640768f9caa944a8981da174752a058
    ;
    ;    Depth: actual=1, wire=1
    ;    Match = mail-in-1.numeezy.com
    ;    Subject = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification 
Authority,O=StartCom Ltd.,C=IL
    ;    Issuer = CN=StartCom Certification Authority,OU=Secure Digital 
Certificate Signing,O=StartCom Ltd.,C=IL
    ;    Valid from 2015-12-16T01:00:05Z until 2030-12-16T01:00:05Z
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 1 1 
d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 0 1 
ea4e5d2b9c99560f13dd094b8121a623bfdd902038dfd6d772ce32ffabec094d
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 1 2 
d26da4f0733b1f4af61f9db3c0e5bd6e379022e41038cb2cf7f38e273bdcaf98e0afd9b119e0fd85b090afec3d46020cbaee0158015666360ccc73418a0d3794
    ; _25._tcp.mail-in-1.numeezy.com. IN TLSA 2 0 2 
6a4bd383b21927f44f09263819d2917edbd8a8ea58d97dac48c26a1e88e5c7062691366f79300705da4b68b5bf9153477241f7603faf4ac03d1cde69abaef328

    numeezy.com. IN MX 5 mail-in-2.numeezy.com.
    numeezy.fr. IN MX 5 mail-in-2.numeezy.com.
    medialta.com. IN MX 5 mail-in-2.numeezy.com.
    medialta.fr. IN MX 5 mail-in-2.numeezy.com.
    medialta.eu. IN MX 5 mail-in-2.numeezy.com.
    mail-in-2.numeezy.com. IN A 37.59.203.174 ; passed
    _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 1 
8aee8995fca9c9cb89d0057f40b42cdcf23b1abc037681acd74af8c68b12a41e ; passed at 
depth=0
    ;
    ;    Depth: actual=0, wire=0
    ;    Subject = CN=mail-in-2.numeezy.com,O=Numeezy 
SARL,L=PARIS,ST=Ile-de-France,C=FR
    ;    Issuer = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification 
Authority,O=StartCom Ltd.,C=IL
    ;    Valid from 2016-05-17T12:39:52Z until 2019-05-17T12:39:52Z
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 1 
8aee8995fca9c9cb89d0057f40b42cdcf23b1abc037681acd74af8c68b12a41e
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 0 1 
c49354b6b553fed27d8b66aa42a7be4f18d8979e5c6260bd62d174051fb58b3a
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 1 2 
7292aba36d879109a7ef70143ca3dc499c7774b693f4e6f9392ccb8b365b084cf583ee2533d4987582d8e8626c7f4d894826f3df0e686c07c201a5af08020b86
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 3 0 2 
cd703c0fd747873a29d6467dc6e18fc7334a94918e59d9c6a9ba7320f1c8aea8473fe8d1edac9f3e2e7d6099eb17231832c5cc013500340be22c3830e91a21a2
    ;
    ;    Depth: actual=1, wire=1
    ;    Match = mail-in-2.numeezy.com
    ;    Subject = CN=StartCom Class 3 OV Server CA,OU=StartCom Certification 
Authority,O=StartCom Ltd.,C=IL
    ;    Issuer = CN=StartCom Certification Authority,OU=Secure Digital 
Certificate Signing,O=StartCom Ltd.,C=IL
    ;    Valid from 2015-12-16T01:00:05Z until 2030-12-16T01:00:05Z
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 1 1 
d765efb29fd40114afb1e830dbca8d1283e99086617ff18b07ad4ba58e7b0166
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 0 1 
ea4e5d2b9c99560f13dd094b8121a623bfdd902038dfd6d772ce32ffabec094d
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 1 2 
d26da4f0733b1f4af61f9db3c0e5bd6e379022e41038cb2cf7f38e273bdcaf98e0afd9b119e0fd85b090afec3d46020cbaee0158015666360ccc73418a0d3794
    ; _25._tcp.mail-in-2.numeezy.com. IN TLSA 2 0 2 
6a4bd383b21927f44f09263819d2917edbd8a8ea58d97dac48c26a1e88e5c7062691366f79300705da4b68b5bf9153477241f7603faf4ac03d1cde69abaef328

You have three year certificates, that may well be "too long", in
3 years time you'll forget you have DANE TLSA records that need to
change when you change your private/public key pair.  Also after
three years you'll probably want a new private key.

Carefully document the correct certificate rollover procedure and
required DNS updates in README files in the directories where the
certificates are kept and reference them in the main.cf file or
other configuration files that use those certificates.

-- 
        Viktor.

Reply via email to