[pfx] Re: Hijacked thread (was: Allow opportunistic DANE when non-DNSSEC...)

2025-02-09 Thread Ömer Güven via Postfix-users
Thanks for separating. Forwarded the remaining thread that was decoupled from the mailing list: > Von: Ömer Güven > Datum: 9. Februar 2025 um 18:30:08 MEZ > An: akritrim® Intelligence™ > Betreff: Aw: [pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC > signed MX p

[pfx] Hijacked thread (was: Allow opportunistic DANE when non-DNSSEC...)

2025-02-09 Thread Wietse Venema via Postfix-users
This is not a tlspol question. > sending to gmail shows up as verified connections but With Postfix, 'verified' means that the certificate matched, either by name or by fingerprint (from certificate or public key). > recieving from gmail shows up as trusted connections With Postfix, 'trusted'

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Ömer Güven via Postfix-users
Please consider this example: tum.de is dane-only mri.tum.de is dane (because they didn‘t sign the MX record, but the MX is virtually the same signed DANE-supporting SMTP server) The Postfix config looks like this: smtp_dns_support_level = dnssec smtp_tls_security_level = may

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Ömer Güven via Postfix-users
Please open an issue in GitHub for problems with postfix-tlspol in the future. I can say that you probably misconfigured something. It has to say ‚Verified TLS‘, so it didn‘t work in your case. Did you use the correct port and socketmap verb? It isn‘t the same as postfix-mta-sts-resolver (socket

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Viktor Dukhovni via Postfix-users
On Sun, Feb 09, 2025 at 04:35:03PM +0100, Ömer Güven via Postfix-users wrote: > I can only endorse this. Simply setting it to „dane“ should solve the > hassle and make the operation more consistent and predictable. The whole thing is a misunderstanding. The insecure MX setting is only ever used

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Ömer Güven via Postfix-users
I can only endorse this. Simply setting it to „dane“ should solve the hassle and make the operation more consistent and predictable. Thanks, Ömer > Am 09.02.2025 um 15:58 schrieb Wietse Venema via Postfix-users > : > > I think that the mistake was to make smtp_tls_dane_insecure_mx_policy >

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread akritrim® Intelligence™ via Postfix-users
e policy. > >I have to calculate the worst-case, like an user configuring „encrypt“ as >default tls policy, and sending a mail to a domain that is not dnssec signed >itself, but points to a third-party mail provider that securely implements >TLSA. >Now tlspol would return „da

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-09 Thread Wietse Venema via Postfix-users
I think that the mistake was to make smtp_tls_dane_insecure_mx_policy dependent on smtp_tls_security_level Will it please Viktor and Omer if I change the default to smtp_tls_dane_insecure_mx_policy = dane That seems to have less of a WTF factor. Here is my motivation to make make dane poli

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
licy. > > I have to calculate the worst-case, like an user configuring „encrypt“ as > default tls policy, and sending a mail to a domain that is not dnssec signed > itself, but points to a third-party mail provider that securely implements > TLSA. > Now tlspol would return „dan

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
default tls policy, and sending a mail to a domain that is not dnssec signed itself, but points to a third-party mail provider that securely implements TLSA. Now tlspol would return „dane“ because the domain does not have all requirements for „dane-only“ set, but opportunistic DANE is still a

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sun, Feb 09, 2025 at 03:00:22AM +0100, Ömer Güven wrote: > How did I misunderstand the settings if Wietse said that > smtp_tls_dane_insecure_mx_policy only defaults to dane, when the > smtp_tls_security_level variable is set to dane, else it defaults to > may, regardless of the security level r

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
I tested it: it is true. Setting the default security level to anything other than „dane“ (even encrypt, verify, secure…) and having the socketmap server return „dane“ downgrades to „may“ (but then negotiates unauth TLS because the remote of course supports encryption). This is a major design fl

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
How did I misunderstand the settings if Wietse said that smtp_tls_dane_insecure_mx_policy only defaults to dane, when the smtp_tls_security_level variable is set to dane, else it defaults to may, regardless of the security level returned by smtp_tls_policy_maps? Either is Wietse wrong or you di

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Feb 08, 2025 at 11:06:08PM +0100, Ömer Güven via Postfix-users wrote: > * Also: the current behavior is counter-intuitive and makes returning > „dane“ completely useless unless the default is also set to „dane“, > because postfix-tlspol only returns „dane“ if „dane-only“ isn‘t > possible b

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Feb 08, 2025 at 04:41:53PM -0500, Wietse Venema via Postfix-users wrote: > > smtp_tls_dane_insecure_mx_policy = ${{$smtp_tls_security_level} == {dane} ? > {dane} : {may}} > > I have one question: > > - Should this expression use the security level from >main.cf:smtp_tls_security_l

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
Postfix-users: >>>> On Sat, Feb 08, 2025 at 05:28:31PM +0100, ?mer G?ven via Postfix-users >>>> wrote: >>>> RFC 7672 says that Opportunistic DANE (security level ?dane?, but not >>>> ?dane-only?) may accept non-DNSSEC derived MX records be eligib

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
ers > : > > Viktor Dukhovni via Postfix-users: >>> On Sat, Feb 08, 2025 at 05:28:31PM +0100, ?mer G?ven via Postfix-users >>> wrote: >>> >>> RFC 7672 says that Opportunistic DANE (security level ?dane?, but not >>> ?dane-only?) may accept non-DN

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Wietse Venema via Postfix-users
Viktor Dukhovni via Postfix-users: > On Sat, Feb 08, 2025 at 05:28:31PM +0100, ?mer G?ven via Postfix-users wrote: > > >RFC 7672 says that Opportunistic DANE (security level ?dane?, but not > >?dane-only?) may accept non-DNSSEC derived MX records be eligible for > &g

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
ostfix-users wrote: > >> RFC 7672 says that Opportunistic DANE (security level „dane“, but not >> „dane-only“) may accept non-DNSSEC derived MX records be eligible for >> DANE on the DNSSEC-signed (e. g. external) SMTP server. >> >> RFC 7672 Section 2.2.1:

[pfx] Re: [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Feb 08, 2025 at 05:28:31PM +0100, Ömer Güven via Postfix-users wrote: >RFC 7672 says that Opportunistic DANE (security level „dane“, but not >„dane-only“) may accept non-DNSSEC derived MX records be eligible for >DANE on the DNSSEC-signed (e. g. external) SM

[pfx] [Bug report] Allow opportunistic DANE when non-DNSSEC signed MX points to DNSSEC-signed SMTP server with TLSA enabled

2025-02-08 Thread Ömer Güven via Postfix-users
Hi!RFC 7672 says that Opportunistic DANE (security level „dane“, but not „dane-only“) may accept non-DNSSEC derived MX records be eligible for DANE on the DNSSEC-signed (e. g. external) SMTP server.RFC 7672 Section 2.2.1: Since the protocol in this memo is an Opportunistic Security protocol

[pfx] Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2024-01-04 Thread Paul Menzel via Postfix-users
Dear Viktor, dear Wietse, Am 25.11.22 um 17:25 schrieb Viktor Dukhovni: On Fri, Nov 25, 2022 at 09:35:28AM -0500, Wietse Venema wrote: Viktor Dukhovni: However, in this case the issue is a minor oversight in the Postfix TLS client code. The intended logging behaviour does not happen. Patch

[pfx] "danebot" beta release (was: DANE and DNSSEC)

2023-05-24 Thread Viktor Dukhovni via Postfix-users
On Mon, May 22, 2023 at 09:53:36PM -0400, Viktor Dukhovni via Postfix-users wrote: > Key reuse as a *default* rollover approach is robust. When it is time > to change keys, one can do so deliberately, and with due care to > prepublish TLSA records matching the *next* key, then after a few TTLs >

[pfx] Re: DANE and DNSSEC

2023-05-22 Thread Viktor Dukhovni via Postfix-users
On Mon, May 22, 2023 at 02:34:41PM +0200, Joachim Lindenberg via Postfix-users wrote: > reusing the private key for too long (say a year or more) is > considered a bad security practice. Imho it is easier to monitor > changes of the issuing CA (I do) or just mark your calendar to update > in Sept

[pfx] Re: DANE and DNSSEC

2023-05-22 Thread Byung-Hee HWANG via Postfix-users
Joachim Lindenberg via Postfix-users writes: > (...) just mark your calendar to update in September 2025 ... Hellow Joachim! Thanks for remarkble tip ^^^ Sincerely, Byung-Hee ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe

[pfx] Re: DANE and DNSSEC

2023-05-22 Thread Joachim Lindenberg via Postfix-users
decide on her/his own. Cheers, Joachim -Ursprüngliche Nachricht- Von: raf via Postfix-users Gesendet: Samstag, 20. Mai 2023 00:53 An: postfix-users@postfix.org Betreff: [pfx] Re: DANE and DNSSEC On Thu, May 18, 2023 at 08:54:16PM +0200, Joachim Lindenberg via Postfix-users wrote

[pfx] Re: DANE and DNSSEC

2023-05-19 Thread raf via Postfix-users
any servers carrying "non-test" traffic. > > You can publish TLSA records for some test host with a self-signed > cert, and check monitoring detects incorrect TLSA records when > mismatched TLSA records are configured (and is not complaining > when the TLSA records are correct).

[pfx] Re: DANE and DNSSEC

2023-05-19 Thread raf via Postfix-users
On Thu, May 18, 2023 at 08:54:16PM +0200, Joachim Lindenberg via Postfix-users wrote: > For Letsencrypt certificates I´d definitely go with 2 1 1 > 8D02536C887482BC34FF54E41D2BA659BF85B341A0A20AFADB5813DCFBCF286D and > optionally the R4 derivate and add their successors when these are about to

[pfx] Re: DANE and DNSSEC

2023-05-19 Thread Byung-Hee HWANG via Postfix-users
Benny Pedersen via Postfix-users writes: > Byung-Hee HWANG via Postfix-users skrev den 2023-05-19 04:26: > >> Thanks for advice! >> >>>[renewalparams] >>>reuse_key = True >>>preferred_chain = ISRG Root X1 > >> And >> I can't say anything yet. I need some test for long tim

[pfx] Re: DANE and DNSSEC

2023-05-19 Thread Benny Pedersen via Postfix-users
Byung-Hee HWANG via Postfix-users skrev den 2023-05-19 04:26: Thanks for advice! [renewalparams] reuse_key = True preferred_chain = ISRG Root X1 And I can't say anything yet. I need some test for long time. If i am sure what DANE is, posttls-finger example.org, basic

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Byung-Hee HWANG via Postfix-users
Viktor Dukhovni via Postfix-users writes: > On Thu, May 18, 2023 at 09:22:34PM +0900, Byung-Hee HWANG via Postfix-users > wrote: > >> And now i added TLSA record for only *outbond* smtp server, >> . > > It is also your secondary MX host: > > https://stats.dnssec-tools.org/explore/?doraji.xyz

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Viktor Dukhovni via Postfix-users
uot; boil down to an initial leap of faith. That said, if you do go with "2 1 1", please look over: https://dnssec-stats.ant.isi.edu/~viktor/x3hosts.html -- Viktor. ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Joachim Lindenberg via Postfix-users
Hello Byung-Hee , for testing you may want to try https://blog.lindenberg.one/EmailSecurityTest. Best Regards, Joachim -Ursprüngliche Nachricht- Von: Byung-Hee HWANG via Postfix-users Gesendet: Mittwoch, 17. Mai 2023 10:16 An: Postfix-users Betreff: [pfx] Re: DANE and DNSSEC Now i

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Joachim Lindenberg via Postfix-users
-Ursprüngliche Nachricht- Von: Viktor Dukhovni via Postfix-users Gesendet: Donnerstag, 18. Mai 2023 15:12 An: postfix-users@postfix.org Betreff: [pfx] Re: DANE and DNSSEC On Thu, May 18, 2023 at 09:22:34PM +0900, Byung-Hee HWANG via Postfix-users wrote: > And now i added TLSA record for o

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Viktor Dukhovni via Postfix-users
On Thu, May 18, 2023 at 09:22:34PM +0900, Byung-Hee HWANG via Postfix-users wrote: > And now i added TLSA record for only *outbond* smtp server, > . It is also your secondary MX host: https://stats.dnssec-tools.org/explore/?doraji.xyz the primary MX host does not yet have TLSA records. Th

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Byung-Hee HWANG via Postfix-users
On Thu, May 18, 2023 at 09:22:34PM +0900, Byung-Hee HWANG via Postfix-users wrote: > Byung-Hee HWANG via Postfix-users writes: > > > Now i added DNSSEC. Currently it is being registra job. 10 minutes ago, > > i did make some DS record at Cloudfalre. > > > > Than

[pfx] Re: DANE and DNSSEC

2023-05-18 Thread Byung-Hee HWANG via Postfix-users
Byung-Hee HWANG via Postfix-users writes: > Now i added DNSSEC. Currently it is being registra job. 10 minutes ago, > i did make some DS record at Cloudfalre. > > Thanks to Joachim, Patrick and raf ^^^ And now i added TLSA record for only *outbond* smtp server, <>. I rea

[pfx] Re: DANE and DNSSEC

2023-05-17 Thread Byung-Hee HWANG via Postfix-users
Now i added DNSSEC. Currently it is being registra job. 10 minutes ago, i did make some DS record at Cloudfalre. Thanks to Joachim, Patrick and raf ^^^ Sincerely, Byung-Hee ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe

[pfx] Re: DANE and DNSSEC

2023-05-11 Thread Byung-Hee HWANG via Postfix-users
raf via Postfix-users writes: > On Thu, May 11, 2023 at 03:17:21PM +0900, Byung-Hee HWANG via Postfix-users > wrote: > >> Hellow Postfix hackers, >> >> I have a questions while reading DANE docs. Is DNSSEC mandotary? For >> making DANE mail server. >&

[pfx] Re: DANE and DNSSEC

2023-05-11 Thread raf via Postfix-users
On Thu, May 11, 2023 at 03:17:21PM +0900, Byung-Hee HWANG via Postfix-users wrote: > Hellow Postfix hackers, > > I have a questions while reading DANE docs. Is DNSSEC mandotary? For > making DANE mail server. > > For now i'm running two postfix servers in public. Act

[pfx] Re: DANE and DNSSEC

2023-05-11 Thread Byung-Hee HWANG via Postfix-users
Dear Patrick, Patrick Ben Koetter via Postfix-users writes: > (...) > You don't need DNSSEC for your DNS zone *if* your server should DANE-verify > other DANE enabled receiver platforms. In this case all you need to do is run > a DNSSEC-verifying DNS resolver on your se

[pfx] Re: DANE and DNSSEC

2023-05-11 Thread Patrick Ben Koetter via Postfix-users
Hey Byung-Hee! * Byung-Hee HWANG via Postfix-users : > Hellow Postfix hackers, > > I have a questions while reading DANE docs. Is DNSSEC mandotary? For > making DANE mail server. > > For now i'm running two postfix servers in public. Actually i'm beginner > in

[pfx] Re: DANE and DNSSEC

2023-05-10 Thread Byung-Hee HWANG via Postfix-users
Joachim Lindenberg via Postfix-users writes: > DNSSEC is mandatory for DANE. Hellow Joachim! Thanks for kind replying ^^^ Sincerely, Byung-Hee -- ^고맙습니다 _布德天下_ 감사합니다_^))// ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscr

[pfx] Re: DANE and DNSSEC

2023-05-10 Thread Joachim Lindenberg via Postfix-users
DNSSEC is mandatory for DANE. Greetings, Joachim -Ursprüngliche Nachricht- Von: Byung-Hee HWANG via Postfix-users Gesendet: Donnerstag, 11. Mai 2023 08:17 An: Postfix Users Betreff: [pfx] DANE and DNSSEC Hellow Postfix hackers, I have a questions while reading DANE docs. Is DNSSEC

[pfx] DANE and DNSSEC

2023-05-10 Thread Byung-Hee HWANG via Postfix-users
Hellow Postfix hackers, I have a questions while reading DANE docs. Is DNSSEC mandotary? For making DANE mail server. For now i'm running two postfix servers in public. Actually i'm beginner in both DANE and DNSSEC. Any comments welcome! Sincerely, Byung-Hee -- ^고맙습니다 _布德

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-25 Thread Viktor Dukhovni
On Fri, Nov 25, 2022 at 09:35:28AM -0500, Wietse Venema wrote: > Viktor Dukhovni: > > However, in this case the issue is a minor oversight in the Postfix TLS > > client code. The intended logging behaviour does not happen. Patch > > below: > > Is there an equivalent for the still supported Postf

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-25 Thread Viktor Dukhovni
On Fri, Nov 25, 2022 at 09:35:28AM -0500, Wietse Venema wrote: > > However, in this case the issue is a minor oversight in the Postfix TLS > > client code. The intended logging behaviour does not happen. Patch > > below: > > Is there an equivalent for the still supported Postfix version 3.5? >

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-25 Thread Wietse Venema
Viktor Dukhovni: > However, in this case the issue is a minor oversight in the Postfix TLS > client code. The intended logging behaviour does not happen. Patch > below: Is there an equivalent for the still supported Postfix version 3.5? That would also fix Postfix version 3.4 which has the same

Re: Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Bill Cole
On 2022-11-21 at 14:45:52 UTC-0500 (Mon, 21 Nov 2022 20:45:52 +0100) Paul Menzel is rumored to have said: Dear Bill, Thank you for your reply. Am 21.11.22 um 19:05 schrieb Bill Cole: On 2022-11-21 at 12:18:33 UTC-0500 (Mon, 21 Nov 2022 18:18:33 +0100) Paul Menzel is rumored to have said:

Re: Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Paul Menzel
Dear Bill, Thank you for your reply. Am 21.11.22 um 19:05 schrieb Bill Cole: On 2022-11-21 at 12:18:33 UTC-0500 (Mon, 21 Nov 2022 18:18:33 +0100) Paul Menzel is rumored to have said: With Postfix 3.6.0-RC1 and     # postconf -n smtp_tls_security_level     smtp_tls_security_level = dane th

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Viktor Dukhovni
in in the email > address does not support DNSSEC. That's where "smtp_tls_dane_insecure_mx_policy" comes into play. > Testing with level `dane` it indeed does mark the TLS connection as > untrusted: > > $ posttls-finger -c -l dane -P /etc/ssl/certs rki.de >

Re: Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Bill Cole
On 2022-11-21 at 12:18:33 UTC-0500 (Mon, 21 Nov 2022 18:18:33 +0100) Paul Menzel is rumored to have said: Dear Postfix folks, With Postfix 3.6.0-RC1 and # postconf -n smtp_tls_security_level smtp_tls_security_level = dane the Postfix SMTP client logs several untrusted TLS connection

Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Paul Menzel
have to do with the SMTP servers publishing TLSA records, but the domain in the email address does not support DNSSEC. Testing with level `dane` it indeed does mark the TLS connection as untrusted: $ posttls-finger -c -l dane -P /etc/ssl/certs rki.de posttls-finger: MX RRset insecure

Re: real-world DANE -- which DNSSEC signing algo(s) to use?

2022-10-12 Thread Viktor Dukhovni
On Wed, Oct 12, 2022 at 09:05:34AM -0400, PGNet Dev wrote: > when selecting DNSSEC signing algorithms for eventual use with DANE > setup, checking first @ > > > https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1 > >

Re: real-world DANE -- which DNSSEC signing algo(s) to use?

2022-10-12 Thread Bill Cole
On 2022-10-12 at 09:05:34 UTC-0400 (Wed, 12 Oct 2022 09:05:34 -0400) PGNet Dev is rumored to have said: *must* I sign my DNSSEC keys for my domains with the same algo in-use by the respective TLDs' roots in order to not fubar DANE usage specifically, No. or can I (arbitrarily) use any

real-world DANE -- which DNSSEC signing algo(s) to use?

2022-10-12 Thread PGNet Dev
when selecting DNSSEC signing algorithms for eventual use with DANE setup, checking first @ https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1 both algos 8 & 13 are listed as options: Number Description Mnem

Re: [solved] DNSSEC/DANE: TLSA records looked up for parent domain

2022-02-17 Thread Paul Menzel
to mention, that this is all handled internally. I haven’t tried from another domain. Not that we have dane-only TLS policy configured for our domains, as we use DNSSEC and the MTAs all have TLSA records published. (And dane TLS policy unfortunately falls back to encrypt and not secure

Re: DNSSEC/DANE: TLSA records looked up for parent domain

2022-02-17 Thread Paul Menzel
internally. I haven’t tried from another domain. Not that we have dane-only TLS policy configured for our domains, as we use DNSSEC and the MTAs all have TLSA records published. (And dane TLS policy unfortunately falls back to encrypt and not secure.) Indeed for github.molgen.mpg.de no MX record

DNSSEC/DANE: TLSA records looked up for parent domain

2022-02-17 Thread Paul Menzel
reply.github.molgen.mpg.de: $ dig mx reply.github.molgen.mpg.de +dnssec +short 5 mx3.molgen.mpg.de. MX 7 5 7200 20220318110038 20220216110038 14960 molgen.mpg.de. kTDvX9PKXC9sk96QViR09wUATN3m96sz6Ha6FrMRBrjxUa1OU1AdhvVj cJbRyetiHy3v+uOPdrng4NLVAow/omnF7Ph0twfz9p9EXUfOBBC/6QJJ

Re: Some DNSSEC/DANE questions

2022-01-04 Thread Michael Grimm
Dan Mahoney wrote >> Here's an SMTP DANE validator that I use when I make changes to my server. >> https://dane.sys4.de/ >> >> I'm not sure if it is just what you're looking for, though. > > No, I am looking for a server to which I can send mail to make sure DANE is > being looked up and used

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Viktor Dukhovni
ssing if there's a full cert path, that "wins"? Is TLSA still > validated at all in this case? That guess is not correct. Postfix honours the specified security level. If you request "dane" you get DANE. You then only get "Trusted" when TLSA records are not publi

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Christian Kivalo
On 2022-01-03 23:02, Dan Mahoney wrote: On Jan 3, 2022, at 1:46 PM, Mike wrote: On 1/3/2022 2:38 PM, Dan Mahoney (Gushi) wrote: [snip] One more question: Does anyone know of a "reflector" like service that one can use to test DANE validation, i.e. a site that one is allowed to send test me

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney
> On Jan 3, 2022, at 1:46 PM, Mike wrote: > > On 1/3/2022 2:38 PM, Dan Mahoney (Gushi) wrote: >> [snip] >> >> One more question: Does anyone know of a "reflector" like service that one >> can use to test DANE validation, i.e. a site that one is allowed to send >> test messages to, that *onl

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Mike
On 1/3/2022 2:38 PM, Dan Mahoney (Gushi) wrote: >[snip] > > One more question: Does anyone know of a "reflector" like service that one > can use to test DANE validation, i.e. a site that one is allowed to send > test messages to, that *only* has DANE as the trust mech (so, say, a > self-signed

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney (Gushi)
s) that may fix this, but right now if you're following RFC7706, this check is lying to you. That said, whomever put this in was good enough to put in a knob to disable it -- but from the docs, it's unclear as to what happens: is dane simply ignored, or is this just a warning that &qu

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Wietse Venema
Dan Mahoney: > > If you enable DNSSEC lookups, Postfix will log a warning when the root > > zone appears unsigned. See: > > > >http://www.postfix.org/postconf.5.html#dnssec_probe > > > >This feature is available in Postfix 3.6 and later. It was &

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney
lidated. > >> In reading over what's required to enable DANE support in postfix, I see >> that there's a compile-time requirement for the DNS lib in the OS to >> support it, which our OS does according to resolv.h. I don't see any >> options in the port

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Viktor Dukhovni
for the DNS lib in the OS to > support it, which our OS does according to resolv.h. I don't see any > options in the port to enable/disable this feature. Most extant Unix-like systems have a DNS stub resolver that supports DNSSEC queries. Postfix just needs the AD bit set in request

Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney (Gushi)
ound mail? If you've set smtp_tls_security_level=dane, but haven't set smtp_dns_support_level=dnssec, is a warning logged? -Dan -- Dan Mahoney Techie, Sysadmin, WebGeek Gushi on efnet/undernet IRC FB: fb.com/DanielMahoneyIV LI: linkedin.com/in/gushi Site: http://www.gushi.org ---

Re: dnssec DS set, but no RRSIG

2021-11-15 Thread Viktor Dukhovni
On Mon, Nov 15, 2021 at 11:58:02AM +0800, Philip Paeps wrote: > On 2021-11-15 11:36:00 (+0800), Benny Pedersen wrote: > > plantmarknaden.com > > > > https://dane.sys4.de/smtp/plantmarknaden.com > > https://dnsviz.net/d/plantmarknaden.com/dnssec/ > > > >

Re: dnssec DS set, but no RRSIG

2021-11-14 Thread Philip Paeps
On 2021-11-15 11:36:00 (+0800), Benny Pedersen wrote: plantmarknaden.com https://dane.sys4.de/smtp/plantmarknaden.com https://dnsviz.net/d/plantmarknaden.com/dnssec/ why diffrent results ? I don't see 'different' results. That domain is broken. Neither of the listed

dnssec DS set, but no RRSIG

2021-11-14 Thread Benny Pedersen
plantmarknaden.com https://dane.sys4.de/smtp/plantmarknaden.com https://dnsviz.net/d/plantmarknaden.com/dnssec/ why diffrent results ?

Re: kolabsys.com still have dnssec unsecure :/

2021-05-07 Thread Viktor Dukhovni
nny Pedersen wrote: > > | [T] kolabsys.com. 86400 IN DNSKEY 256 3 5 ;{id = 47193 (zsk), size = > > 2048b} > > Warning I am not dnssec expert, but I think algo 5 is now deprecated Though algorithm 5 is deprecated, it is still supported by mainstream resolvers, so while they sho

Re: kolabsys.com still have dnssec unsecure :/

2021-05-04 Thread Benny Pedersen
= 1280b} | [T] kolabsys.com. 86400 IN DNSKEY 256 3 5 ;{id = 47193 (zsk), size = 2048b} | [T] kolabsys.com. 86400 IN A 212.103.80.148 | ;;[S] self sig OK; [B] bogus; [T] trusted warning i am not dnssec expert, but i think algo 5 is now depricated https://dane.sys4.de/smtp

Re: kolabsys.com still have dnssec unsecure :/

2021-05-04 Thread Bastian Blank
Hi Benny On Tue, May 04, 2021 at 09:35:29PM +0200, Benny Pedersen wrote: > in bind9 i just do > rndc nta kolabsys.com > it have being a problem very long time now :/ What is the problem you are seeing? Yes, kolabsys.com is not in good shape, see https://dnsviz.net/d/kolabsys.com/dnss

kolabsys.com still have dnssec unsecure :/

2021-05-04 Thread Benny Pedersen
in bind9 i just do rndc nta kolabsys.com it have being a problem very long time now :/ after that i see that ssl gives untrusted, but mail to maillist is atleast delivered should i resolve the untrusted part seen from posttls_finger lists.roundcube.net ?

Re: DNSSEC Howto?

2021-03-27 Thread Francesc Peñalvez
thanks Viktor El 28/03/2021 a las 1:21, Viktor Dukhovni escribió: On Sun, Mar 28, 2021 at 01:08:44AM +0100, Francesc Peñalvez wrote: Right now dnssec is activated in the external manager zoneedit.com, in which I cannot modify the type of encryption or the length of the key. If there are no

Re: DNSSEC Howto?

2021-03-27 Thread Viktor Dukhovni
On Sun, Mar 28, 2021 at 01:08:44AM +0100, Francesc Peñalvez wrote: > Right now dnssec is activated in the external manager zoneedit.com, in > which I cannot modify the type of encryption or the length of the key. If there are no key size or algorithm settings in zoneedit.com, then indeed

Re: DNSSEC Howto?

2021-03-27 Thread Francesc Peñalvez
Right now dnssec is activated in the external manager zoneedit.com, in which I cannot modify the type of encryption or the length of the key. And if I am looking to activate inbound and outbound dnssec with my postfix El 28/03/2021 a las 1:03, Viktor Dukhovni escribió: On Sat, Mar 27, 2021 at

Re: DNSSEC Howto?

2021-03-27 Thread Viktor Dukhovni
hough I have another installed and running locally. OK, so you have an outsourced public authoritative server for your DNSSEC signed domain > Both in the external and internal services of bind I have the same > configuration of dmarc and dkim and of course I would like to know, I > am real

Re: DNSSEC Howto?

2021-03-27 Thread Francesc Peñalvez
services of bind I have the same configuration of dmarc and dkim and of course I would like to know, I am really a novice in system administration, if the external dnssec configuration that manages the domain, zoneedit, is enough to use dnssec correctly? El 27/03/2021 a las 13:34, Viktor Dukhovni

Re: DNSSEC Howto?

2021-03-27 Thread Viktor Dukhovni
On Sat, Mar 27, 2021 at 12:51:36PM +0100, Francesc Peñalvez wrote: > I have the dns of the domain managed externally, configured with > dnssec, and another host running postfix. How could I integrate that > postfix use the dnssec configuration? Would it be enough to add the > dns of

DNSSEC Howto?

2021-03-27 Thread Francesc Peñalvez
I have the dns of the domain managed externally, configured with dnssec, and another host running postfix. How could I integrate that postfix use the dnssec configuration? Would it be enough to add the dns of the external service to the postfix resolv.conf? -- smime.p7s Description: Firma

Re: Postfix probe to find out id DNSSEC works

2020-09-29 Thread Wietse Venema
Viktor Dukhovni: > > On Sep 28, 2020, at 7:09 PM, Wietse Venema wrote: > > > > We could log the DNSSEC status only if DNS was 'secure', like we > > log the connection reuse counter only when a connection was used > > more than once. > > Makes sens

Re: Postfix probe to find out id DNSSEC works

2020-09-28 Thread Viktor Dukhovni
> On Sep 28, 2020, at 7:09 PM, Wietse Venema wrote: > > We could log the DNSSEC status only if DNS was 'secure', like we > log the connection reuse counter only when a connection was used > more than once. Makes sense I think, and would probably do the job. The key q

Re: Postfix probe to find out id DNSSEC works

2020-09-28 Thread Wietse Venema
Viktor Dukhovni: > On Sun, Sep 27, 2020 at 05:56:52PM -0400, Wietse Venema wrote: > > > A draft manpage is below. > > > > It looks very reasonable. The news might not reach the folks who > only search for particular queue ids in the logs, but shoehorning > a (sa

Re: Postfix probe to find out id DNSSEC works

2020-09-28 Thread Viktor Dukhovni
On Sun, Sep 27, 2020 at 05:56:52PM -0400, Wietse Venema wrote: > A draft manpage is below. > It looks very reasonable. The news might not reach the folks who only search for particular queue ids in the logs, but shoehorning a (say the MX lookup) DNSSEC status into each smtp delivery log

Postfix probe to find out id DNSSEC works

2020-09-27 Thread Wietse Venema
Earlier this year there was a thread about Postfix failing to notice that some TLSA record was corrupted, because - Postfix was configured to use opportunistic DANE, which ignores TLSA records when they aren't DNSSEC validated. - Some system library API did not indicate whether responses

Microsoft Servers with DANE & DNSSEC

2020-05-19 Thread Gerard E. Seibert
Microsoft has finally decided to add DANE and DNSSEC support to Exchange Online servers. https://techcommunity.microsoft.com/t5/exchange-team-blog/support-of-dane-and-dnssec-in-office-365-exchange-online/ba-p/1275494 -- Jerry pgpn6634G_3L3.pgp Description: OpenPGP digital signature

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-29 Thread Wietse Venema
Florian Weimer: > > I exposed these two options in Postfix configuration using the > > existing names and semantics, so that users would not need to learn > > different names with different semantics. Humans have better things > > to do than riding bikes with a reversed steering mechanism. > > Exc

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-29 Thread Florian Weimer
* Wietse Venema: >> This is an interesting data point because the interaction between >> RES_DEFNAMES, RES_DNSRCH, and the ndots and no-tld-query options are >> far from obvious. Even the exact impact of RES_DEFNAMES and >> RES_DNSRCH probably varies between code written from scratch and the >> B

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Wietse Venema
t;> >> > >> >> >> This will not give the result that Postfix programmers want on newer > >> >> >> glibc versions (not without the trust-ad flag in /etc/resolv.conf). > >> >> > > >> >> > The problem with using low-

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Florian Weimer
st-ad flag in /etc/resolv.conf). >> >> > >> >> > The problem with using low-level res_*mkquery() is that Postfix >> >> > would have to re-implement all the high-level res_search() features >> >> > such as RES_DEFNAMES, RES_DNSRCH, retries ov

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Wietse Venema
h using low-level res_*mkquery() is that Postfix > >> > would have to re-implement all the high-level res_search() features > >> > such as RES_DEFNAMES, RES_DNSRCH, retries over TCP after receiving > >> > a truncated response, and so on. > >> > >> I

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Florian Weimer
search() features >> > such as RES_DEFNAMES, RES_DNSRCH, retries over TCP after receiving >> > a truncated response, and so on. >> >> I don't think this is actually an issue: TCP fallback is still >> performed with res_send. If you care about DNSSEC va

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Wietse Venema
receiving > > a truncated response, and so on. > > I don't think this is actually an issue: TCP fallback is still > performed with res_send. If you care about DNSSEC validation, you > cannot really use search list processing anyway because you might not > get back the name

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Florian Weimer
; > The problem with using low-level res_*mkquery() is that Postfix > would have to re-implement all the high-level res_search() features > such as RES_DEFNAMES, RES_DNSRCH, retries over TCP after receiving > a truncated response, and so on. I don't think this is actually an issue: TCP

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Wietse Venema
Florian Weimer: > * Rich Felker: > > > A solution that would work with existing and future versions of musl > > as well as glibc, and would (I think) avoid the need to poke at _res > > to set the glibc trustad flag, would be replacing the call to > > res_query with res_mkquery, |='ing the AD bit i

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-28 Thread Florian Weimer
* Rich Felker: > A solution that would work with existing and future versions of musl > as well as glibc, and would (I think) avoid the need to poke at _res > to set the glibc trustad flag, would be replacing the call to > res_query with res_mkquery, |='ing the AD bit into place, then > res_send.

Re: PATCH: Glibc-2.31 DNSSEC and GCC 10

2020-04-27 Thread Rich Felker
On Sun, Apr 19, 2020 at 02:16:01PM -0400, Viktor Dukhovni wrote: > On Sun, Apr 19, 2020 at 08:02:41PM +0200, Matus UHLAR - fantomas wrote: > > > On 19.04.20 13:11, Wietse Venema wrote: > > > > >Warning: libc-musl breaks DANE/TLSA security. > > >Use a glibc-based Linux distribution instead. > > >Re

  1   2   3   >