On Sat, Mar 27, 2021 at 12:51:36PM +0100, Francesc Peñalvez wrote:

> I have the dns of the domain managed externally, configured with
> dnssec, and another host running postfix. How could I integrate that
> postfix use the dnssec configuration? Would it be enough to add the
> dns of the external service to the postfix resolv.conf?

As written, the question makes no sense.  You'll need to
explain your goals in more detail.

    - If your domain is already signed, then clients
      resolving data about your domain are able (when
      suitably configured) to validate the integrity
      of that data.

    - If you're looking to use DNSSEC as a client, to
      validate DNS records of remote domains, all you
      need is a local (running on the Postfix server
      itself, listening on 127.0.0.1:53) validating
      resolver, such as unbound, Knot, BIND, ...

* The DNSSEC status of your own domain is irrelevant
  for validating remote domains.

* Validating remote domains does not directly do anything
  to ensure data integrity for your own domains when queried
  by others.

See:

    https://stats.dnssec-tools.org/explore/?almogavers.net
    https://dnsviz.net/d/almogavers.net/YFjc3g/dnssec/

I would perhaps recommed either switching to algorithm 13 (ECDSA P256),
which has better security at a lower key size, or use a ZSK that is
shorter than 2048 bits (1280 bits is what .COM uses), which tends to be
a bit too large for unfragmented UDP when responses carry multiple
signatures (e.g.  NSEC3 negative answers).  Fragmented UDP is not
reliable these days over wide-area networks.

For small zones with no names to hide, just use NSEC.

-- 
    Viktor.

Reply via email to