Hello Viktor,
thanks for looking into it!

>A signed TLSA "2 1 1" record for mx03 matching the Let's Encrypt "R3"
>intermediate issuer.  You should really also publish at least also a TLSA 
>record matching "R4" key. See

>    https://dnssec-stats.ant.isi.edu/~viktor/x3hosts.html
Thanks for the advice, but actually I implemented monitoring that I never 
install a renewed certificate that does not match the published TLSA. Will 
consider anyway.

>>    mx04.et.lindenberg.one. IN A 82.165.56.12 ; NoError AD=1
>>    mx04.et.lindenberg.one. IN AAAA 2001:8d8:1801:28c::1:4 ; NoError AD=1
>>    _25._tcp.mx04.et.lindenberg.one. IN CNAME _selftlsa.lindenberg.one. ; 
>> NoError AD=1
>>    _selftlsa.lindenberg.one. IN TLSA 3 1 1 
>> fe950f86708244329b4675b7adc120ee2d3f66a90c01449c8c24fea99f3e2909 ; NoError 
>> AD=1

>A signed TLSA "3 1 1" record for "mx04".
Yes. I want to test some interoperability and error scenarios. The fact that 
some of the TLSA records don’t match the certificates (whether LE or 
self-signed) is not the issue, as postfix doesn´t connect.

>> When I send a mail from my postfix however, postfix reports “no TLSA 
>> records found“. Or full log entries:
>>
>> warning: TLS policy lookup for et.lindenberg.one/et.lindenberg.one: no
>>   TLSA records found 49B4E0EAC: to=<t...@et.lindenberg.one>, relay=none,
>>   delay=49105, delays=49104/0.04/0.51/0, dsn=4.7.5, status=deferred (no
>>   TLSA records found)

>Typically this suggests that you're not querying a validating DNS resolver, or 
>are using a recent glibc with requires the "trustad" option to be set, ...
Sure. That´s why I tested a differend dane domain (with TLS policy dane-only) 
and it worked. And see below.

>> I can confirm smtp_dns_support_level = dnssec is set, and 
>> smtp_host_lookup is not set (default). I also confirmed DNSSEC is 
>> working by sending a test mail to some other DANE site successfully 
>> (with a TLS policy dane-only).
>> 
>> The only difference I noticed is that the other site uses a TLSA 2 0 1 
>> … whereas I use 2 1 1.

>You're doing better than they are.  When I wrote RFC 7671 it seemed at the 
>time that "2 0 1" would be the better choice.  History proved otherwise.
Thanks, but I researched a little, and also noticed you are the expert.

>> Is postfix more picky than other tools? A configuration issue? Or 
>> anything else I should watch out for?

>Is the recursive nameserver you're querying (typically BIND) also an 
>authoritative server for "et.lindenberg.one"?  If so, it may not set the "AD" 
>bit in responses for this domain, setting the "AA" bit instead.
>Postfix does not presently treat the "AA" bit as an indication of a secure 
>answer.  Typically your recursive resolver is not also an authoritative server 
>for any zones (best-practice separation of duties).
This is a mailcow-dockerized installation. It uses unbound as the recursive 
resolver, and as it resolved the other dane domain flawlessly I suspect it is 
configured properly. My authoritative NS are cloudflare´s.
 
>I've considered treating "AA" as equivalent to "AD" (perhaps subject to a 
>non-default configuration option).  But this has not been implemente as of yet.

>-- 
>    Viktor.

I am really wondering why it works for one domain and doesn´t for mine.

Thanks a lot!
Joachim


Reply via email to