>So you're looking for DANE or else "verify" conditional on DNSSEC, that's not 
>a feature of Postfix, and many DNSSEC-signed domains have neither DANE, nor 
>certificates that verify.  
>Will you be making manual exceptions for them all?  Yes, many happen to have 
>MX host with working WebPKI certs that match the MX hostname, but there is no 
>way to know a priori where you can expect/rely on this...
Actually I am really considering a small script that looks at the queue and 
adds rules on the fly. Any guidance or help definitely appreciated. And if that 
works out one might consider a new configuration option.
Right now I am adding exceptions manually, tedious of course. The pattern is 
like:
(Server certificate not verified) -> "encrypt" instead default "verify" (I am 
not checking DNSSEC manually yet, and if I would then probably for statistics 
only)
(TLS is required, but was not offered...) ->  "may" instead of "verify"
In fact I complained to the organization that had no TLS for violating data 
protection regulation.

>Note that ~18% of DNSSEC-signed domains have DANE, which is pretty good IMHO, 
>and I hope will get better over time.
The real problem is less than 2% DNSSEC in Germany (.de only. I am in the 
minority with my de out of a total of three domains supporting).
>You're rather impatient, improvements in core Internet infrastructure take 
>decades, my advice is to live with the Internet we have, and be more patient 
>about things we'd like to have, but can't yet.
I am in the industry for four decades, and sometimes I advocate change 😉

Cheers, Joachim


Reply via email to