On Fri, Apr 17, 2020 at 03:59:49PM -0700, PGNet Dev wrote:

>  Real World DANE Inter-domain email transport
> 
>   https://static.ptbl.co/static/attachments/169319/1520904692.pdf

More at:

    https://github.com/baknu/DANE-for-SMTP/wiki/2.-Implementation-resources

Specific issues:

    
https://github.com/internetstandards/toolbox-wiki/blob/master/DANE-for-SMTP-how-to.md
    https://mail.sys4.de/pipermail/dane-users/2018-February/000440.html
    
https://community.letsencrypt.org/t/please-avoid-3-0-1-and-3-0-2-dane-tlsa-records-with-le-certificates/7022/17
    https://mail.sys4.de/pipermail/dane-users/2017-August/000417.html

> Any favorites/recommendations for current "what/why" & "how to" DNSSEC/DANE 
> with Postfix docs/tutorials/posts/etc?

Postfix documentation covers the client side, but the DANE for servers
HOTWO has not yet been written.  This is partly because there's little
that's Postfix-specific there.  What's required is general operational
discipline around monitoring, DNSSEC and certificate management taking
cached TLSA records into account.

> Particularly for completely-new-to-DNSSEC/DANE, but mostly
> self-sufficient with Postfix otherwise, admins?

The client side is easy:

    * Postfix >= 2.11, but at this point 3.2 is the oldest still supported.
    * Loopback validating resolver, e.g. BIND or unbound.
    * Only 127.0.0.1 in /etc/resolv.conf
    * smtp_dns_support_level = dnssec
    * smtp_tls_security_level = dane

The server side is where the operational discipline is needed:

    * To manage and monitor DNS (tools improving, BIND 9.16 highly
      recommended with much better support for automatic signing and
      ZSK, and KSK rollover).

      - Monitor slave replication
      - Monitor signature expiration 
      - Monitor consistency of glue NS records with zone apex
      - Monitor DS RRset vs. KSK consistency

    * To manage and monitor TLSA records:

      - pre-publish new TLSA RRs multiple TTLs before making
        the corresponding certificate chain changes.

      - make sure that TLSA RRs cover every support SNI name,
        and as appropriate the cert chain for each algorithm
        (RSA, ECDSA, ...) for which you have certificates.

      - monitor the correctness of the TLSA records by running
        frequent (say hourly) tests of all applicable certificate
        chains (SNI and/or algorithm-specific).

      - monitor STARTTLS support to make sure that STARTTLS is
        consistently available, certificates are not expired (when
        publishing "2 1 1", or similar DANE-TA(2) records), that
        all expected TLS protocol versions work (TLSv1.2 required,
        TLSv1.3 recommended).

      - ...

Writing all of this down in detail is a non-trivial project, and would
perhaps be a small book.  I've not had the cycles... :-(

I've started work on some text for this to add to the Postfix
TLS_README, but it won't cover all the topics, and will only sketch out
the requirements, the reader will need to fill in various details from
other sources (or prior experience).

-- 
    Viktor.

Reply via email to