On Mon, May 03, 2021 at 01:56:32PM +0200, Bjoern Franke wrote: > It seems neusta.de can be added to the list: > > posttls-finger neusta.de > posttls-finger: warning: DANE TLSA lookup problem: Host or domain name not > found. Name service error for name=_25._tcp.smtp-relay-in-s1.neusta.de > type=TLSA: Host not found, try again > posttls-finger: Failed to establish session to neusta.de via > smtp-relay-in-s1.neusta.de: TLSA lookup error for > smtp-relay-in-s1.neusta.de:25 > > Postfix uses knot-resolver, knot-resolver disables QNAME-minimization > automatically.
I am not sure what you mean by "disables QNAME-minimisation automatically", but if it is on by default, and subject to some sort of dynamic fallback, I strongly recommend that you instead disable it *statically* (always off), or set a very small limit on the number of labels for which it is applied: - No qname minimisation after the first two labels, the first 3-label query should be the full domain. My resolver has no trouble getting denial of existence for this domain (which foolishly uses NSEC3 opt-out, but that's typically harmless): neusta.de. IN MX 10 smtp-relay-in-s1.neusta.de. ; NoError AD=1 smtp-relay-in-s1.neusta.de. IN A 82.198.213.163 ; NoError AD=1 smtp-relay-in-s1.neusta.de. IN AAAA ? ; NODATA AD=1 _25._tcp.smtp-relay-in-s1.neusta.de. IN TLSA ? ; NXDomain AD=0 Thus posttls-finger also works: $ posttls-finger -c -Lsummary neusta.de posttls-finger: certificate verification failed for smtp-relay-in-s1.neusta.de[82.198.213.163]:25: untrusted issuer /C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services posttls-finger: Untrusted TLS connection established to smtp-relay-in-s1.neusta.de[82.198.213.163]:25: TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256 I use "unbound" with qname minimisation not enabled. -- Viktor.