On Thu, Jan 16, 2020 at 12:51:18PM -0500, Viktor Dukhovni wrote:
On Thu, Jan 16, 2020 at 06:03:29PM +0100, Thomas wrote:
How can I check whether the recipient / operator of an email server
where I send email also operates one that offers it at all?
Respectively. what is the state of the art that he should use / offer?
Please also consider RFC8314[2]
The answer is a matter of taste. I think it is safe to say that support
STARTTLS (with TLS 1.2 and perhaps also TLS 1.3) is now expected
best-practice behaviour. Just TLS 1.0 (or 1.1) are likely to soon if
not already encounter interoperability issues as operators start to
phase out these now deprecated TLS versions. Beyond that,
I'd agree to that.
* Many will recommend DKIM and SPF. I am not a fan of these, but
I grudgingly added SPF to reduce some friction. Some will also
strongly recommend DMARC, which I personally find particularly
objectionable.
Could you elaborate a bit about 'why'?
* I'd like to recommend DNSSEC and DANE to secure inbound email,
and there is noticeable support and momentum behind this in
Northern Europe. However, overall support for DNSSEC and DANE
is still the exception and not the rule.
Just wanted to add that some TLDs are not supporting DNSSEC (yet).
https://stats.dnssec-tools.org/
https://mail.sys4.de/pipermail/dane-users/2020-January/000546.html
Please deploy DNSSEC and DANE, but these are not suitable as a
fire and forget fashion statement. They take some operational
dilligence to implement correctly, with monitoring and carefully
thought out key rollover processes a must.
+1
https://mail.sys4.de/pipermail/dane-users/2018-February/000440.html
https://github.com/internetstandards/toolbox-wiki/blob/master/DANE-for-SMTP-how-to.md
https://community.letsencrypt.org/t/please-avoid-3-0-1-and-3-0-2-dane-tlsa-records-with-le-certificates/7022/17
https://mail.sys4.de/pipermail/dane-users/2017-August/000417.html
https://github.com/baknu/DANE-for-SMTP/wiki/2.-Implementation-resources
* To secure inbound email from Google, Microsoft, et. al, you could
also implement MTA-STS, which like DANE also requires some care
and feeding. Don't to it unless you can do it right.
From the RFC 8461[1]
»SMTP MTA Strict Transport Security (MTA-STS) is a mechanism enabling
mail service providers (SPs) to declare their ability to receive
Transport Layer Security (TLS) secure SMTP connections and to specify
whether sending SMTP servers should refuse to deliver to MX hosts
that do not offer TLS with a trusted server certificate.«
Just to give an overview what MTA-STS is.
Greetings
[1] https://tools.ietf.org/html/rfc8314
[2] https://tools.ietf.org/html/rfc8461