On Mon, May 03, 2021 at 01:56:32PM +0200, Bjoern Franke wrote:

> It seems neusta.de can be added to the list:
> 
> posttls-finger neusta.de
> posttls-finger: warning: DANE TLSA lookup problem: Host or domain name not 
> found. Name service error for name=_25._tcp.smtp-relay-in-s1.neusta.de 
> type=TLSA: Host not found, try again
> posttls-finger: Failed to establish session to neusta.de via
> smtp-relay-in-s1.neusta.de: TLSA lookup error for
> smtp-relay-in-s1.neusta.de:25
> 
> Postfix uses knot-resolver, knot-resolver disables QNAME-minimization
> automatically.

I am not sure what you mean by "disables QNAME-minimisation
automatically", but if it is on by default, and subject to some sort of
dynamic fallback, I strongly recommend that you instead disable it
*statically* (always off), or set a very small limit on the number of
labels for which it is applied:

    - No qname minimisation after the first two labels, the first
      3-label query should be the full domain.

My resolver has no trouble getting denial of existence for this
domain (which foolishly uses NSEC3 opt-out, but that's typically
harmless):

    neusta.de. IN MX 10 smtp-relay-in-s1.neusta.de. ; NoError AD=1
    smtp-relay-in-s1.neusta.de. IN A 82.198.213.163 ; NoError AD=1
    smtp-relay-in-s1.neusta.de. IN AAAA ? ; NODATA AD=1
    _25._tcp.smtp-relay-in-s1.neusta.de. IN TLSA ? ; NXDomain AD=0

Thus posttls-finger also works:

    $ posttls-finger -c -Lsummary neusta.de
    posttls-finger: certificate verification failed for 
smtp-relay-in-s1.neusta.de[82.198.213.163]:25: untrusted issuer 
/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate 
Services
    posttls-finger: Untrusted TLS connection established to 
smtp-relay-in-s1.neusta.de[82.198.213.163]:25: TLSv1.3 with cipher 
TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature 
RSA-PSS (2048 bits) server-digest SHA256

I use "unbound" with qname minimisation not enabled.

-- 
    Viktor.

Reply via email to