[pfx] Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2024-01-04 Thread Paul Menzel via Postfix-users
Dear Viktor, dear Wietse, Am 25.11.22 um 17:25 schrieb Viktor Dukhovni: On Fri, Nov 25, 2022 at 09:35:28AM -0500, Wietse Venema wrote: Viktor Dukhovni: However, in this case the issue is a minor oversight in the Postfix TLS client code. The intended logging behaviour does not happen. Patch

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-25 Thread Viktor Dukhovni
On Fri, Nov 25, 2022 at 09:35:28AM -0500, Wietse Venema wrote: > Viktor Dukhovni: > > However, in this case the issue is a minor oversight in the Postfix TLS > > client code. The intended logging behaviour does not happen. Patch > > below: > > Is there an equivalent for the still supported Postf

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-25 Thread Viktor Dukhovni
On Fri, Nov 25, 2022 at 09:35:28AM -0500, Wietse Venema wrote: > > However, in this case the issue is a minor oversight in the Postfix TLS > > client code. The intended logging behaviour does not happen. Patch > > below: > > Is there an equivalent for the still supported Postfix version 3.5? >

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-25 Thread Wietse Venema
Viktor Dukhovni: > However, in this case the issue is a minor oversight in the Postfix TLS > client code. The intended logging behaviour does not happen. Patch > below: Is there an equivalent for the still supported Postfix version 3.5? That would also fix Postfix version 3.4 which has the same

Re: Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Bill Cole
On 2022-11-21 at 14:45:52 UTC-0500 (Mon, 21 Nov 2022 20:45:52 +0100) Paul Menzel is rumored to have said: Dear Bill, Thank you for your reply. Am 21.11.22 um 19:05 schrieb Bill Cole: On 2022-11-21 at 12:18:33 UTC-0500 (Mon, 21 Nov 2022 18:18:33 +0100) Paul Menzel is rumored to have said:

Re: Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Paul Menzel
Dear Bill, Thank you for your reply. Am 21.11.22 um 19:05 schrieb Bill Cole: On 2022-11-21 at 12:18:33 UTC-0500 (Mon, 21 Nov 2022 18:18:33 +0100) Paul Menzel is rumored to have said: With Postfix 3.6.0-RC1 and     # postconf -n smtp_tls_security_level     smtp_tls_security_level = dane th

Re: (Patch "half-dane" logging corner case) Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Viktor Dukhovni
On Mon, Nov 21, 2022 at 06:18:33PM +0100, Paul Menzel wrote: > With Postfix 3.6.0-RC1 and I am curious why you are using a rather dated release-candidate. > After a while of head scratching, I thought it might have to do with the > SMTP servers publishing TLSA records, but the domain in the ema

Re: Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Bill Cole
On 2022-11-21 at 12:18:33 UTC-0500 (Mon, 21 Nov 2022 18:18:33 +0100) Paul Menzel is rumored to have said: Dear Postfix folks, With Postfix 3.6.0-RC1 and # postconf -n smtp_tls_security_level smtp_tls_security_level = dane the Postfix SMTP client logs several untrusted TLS connection

Untrusted TLS connections where email domain does not support DNSSEC but MX server has DNSSEC/DANE records

2022-11-21 Thread Paul Menzel
Dear Postfix folks, With Postfix 3.6.0-RC1 and # postconf -n smtp_tls_security_level smtp_tls_security_level = dane the Postfix SMTP client logs several untrusted TLS connections for hosts with a good TLS certificate setup. It’s mainly German research organizations using the DFN-Mai

Re: [solved] DNSSEC/DANE: TLSA records looked up for parent domain

2022-02-17 Thread Paul Menzel
Dear Postfix folks, Am 17.02.22 um 15:56 schrieb Paul Menzel: Am 17.02.22 um 10:57 schrieb Paul Menzel: Using Postfix 3.6.0-rc1, for an email sent to x.y.molgen.mpg.de it looks up the TLSA records for y.molgen.mpg.de instead of x.y.molgen.mpg.de: 2022-02-12T12:02:21+01:00 tldr postfi

Re: DNSSEC/DANE: TLSA records looked up for parent domain

2022-02-17 Thread Paul Menzel
Dear Postfix folks, Am 17.02.22 um 10:57 schrieb Paul Menzel: Using Postfix 3.6.0-rc1, for an email sent to x.y.molgen.mpg.de it looks up the TLSA records for y.molgen.mpg.de instead of x.y.molgen.mpg.de:     2022-02-12T12:02:21+01:00 tldr postfix/smtp[25656]: warning: TLS policy lookup fo

DNSSEC/DANE: TLSA records looked up for parent domain

2022-02-17 Thread Paul Menzel
Dear Postfix folks, Using Postfix 3.6.0-rc1, for an email sent to x.y.molgen.mpg.de it looks up the TLSA records for y.molgen.mpg.de instead of x.y.molgen.mpg.de: 2022-02-12T12:02:21+01:00 tldr postfix/smtp[25656]: warning: TLS policy lookup for github.molgen.mpg.de/github.molgen.mpg.de:

Re: Some DNSSEC/DANE questions

2022-01-04 Thread Michael Grimm
Dan Mahoney wrote >> Here's an SMTP DANE validator that I use when I make changes to my server. >> https://dane.sys4.de/ >> >> I'm not sure if it is just what you're looking for, though. > > No, I am looking for a server to which I can send mail to make sure DANE is > being looked up and used

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Viktor Dukhovni
On Mon, Jan 03, 2022 at 09:47:44AM -0800, Dan Mahoney wrote: > Also...the server I'm sending to has a legit signed cert that matches > its hostname, so the message I get is: > > Trusted TLS connection established to prime.gushi.org[149.20.68.142]:25: > TLSv1.2 with cipher ECDHE-RSA-AES256-G

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Christian Kivalo
On 2022-01-03 23:02, Dan Mahoney wrote: On Jan 3, 2022, at 1:46 PM, Mike wrote: On 1/3/2022 2:38 PM, Dan Mahoney (Gushi) wrote: [snip] One more question: Does anyone know of a "reflector" like service that one can use to test DANE validation, i.e. a site that one is allowed to send test me

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney
> On Jan 3, 2022, at 1:46 PM, Mike wrote: > > On 1/3/2022 2:38 PM, Dan Mahoney (Gushi) wrote: >> [snip] >> >> One more question: Does anyone know of a "reflector" like service that one >> can use to test DANE validation, i.e. a site that one is allowed to send >> test messages to, that *onl

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Mike
On 1/3/2022 2:38 PM, Dan Mahoney (Gushi) wrote: >[snip] > > One more question: Does anyone know of a "reflector" like service that one > can use to test DANE validation, i.e. a site that one is allowed to send > test messages to, that *only* has DANE as the trust mech (so, say, a > self-signed

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney (Gushi)
On Mon, 3 Jan 2022, Dan Mahoney wrote: This is a problem when your local resolver is slaving the root zone, as a standard root zone "type slave" will hand . NS out with the AA bit set, but will not set the AD bit. There's a feature in more recent versions of BIND (mirror zones) that may fix

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Wietse Venema
Dan Mahoney: > > If you enable DNSSEC lookups, Postfix will log a warning when the root > > zone appears unsigned. See: > > > >http://www.postfix.org/postconf.5.html#dnssec_probe > > > >This feature is available in Postfix 3.6 and later. It was > >backported to Postfix versions 3.5.9

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney
> On Jan 3, 2022, at 6:22 AM, Viktor Dukhovni > wrote: > > On Mon, Jan 03, 2022 at 05:49:05AM -0800, Dan Mahoney (Gushi) wrote: > >> We run validating resolvers at the day job, but by default not on the box >> where postfix runs. (I.e. we rely on the AD bit). > > "Relying in the AD bit" i

Re: Some DNSSEC/DANE questions

2022-01-03 Thread Viktor Dukhovni
On Mon, Jan 03, 2022 at 05:49:05AM -0800, Dan Mahoney (Gushi) wrote: > We run validating resolvers at the day job, but by default not on the box > where postfix runs. (I.e. we rely on the AD bit). "Relying in the AD bit" is independent of whether the validating resolver is local or remote. How

Some DNSSEC/DANE questions

2022-01-03 Thread Dan Mahoney (Gushi)
Hey there, We run validating resolvers at the day job, but by default not on the box where postfix runs. (I.e. we rely on the AD bit). In reading over what's required to enable DANE support in postfix, I see that there's a compile-time requirement for the DNS lib in the OS to support it, wh

Re: DNSSEC, DANE, Postfix for new-to-it admins?

2020-04-17 Thread PGNet Dev
On 4/17/20 4:29 PM, Viktor Dukhovni wrote: > More at: all links appreciated. the summary's particularly nicely readable by those of among the minion masses of normal humans ;-) > Postfix documentation covers the client side still among the best, most-exhaustively detailed s/docs/reference man/

Re: DNSSEC, DANE, Postfix for new-to-it admins?

2020-04-17 Thread Viktor Dukhovni
l.sys4.de/pipermail/dane-users/2017-August/000417.html > Any favorites/recommendations for current "what/why" & "how to" DNSSEC/DANE > with Postfix docs/tutorials/posts/etc? Postfix documentation covers the client side, but the DANE for servers HOTWO has not yet been written.

DNSSEC, DANE, Postfix for new-to-it admins?

2020-04-17 Thread PGNet Dev
all this back-n-forth on list re: DNSSEC/DANE has resulted in a flurry of interest among colleagues etc. and i've been getting emails. lots. for the what/why i've been tossing them Viktor's now just slightly dusty preso Real World DANE Inter-domain email transport https:/

OT - DNSSEC DANE rollover

2015-01-10 Thread John Allen
I wrote the attached script to help me with key rollover. I am not sure where to go with this. If anybody is interested take a look and make what use of you will. Comments and suggestions please. John A #!/bin/bash # # Why this script, the ISC has do created a number of tools to manage and gen

Re: DNSSEC - DANE

2014-12-31 Thread John
On December 31, 2014 12:37:52 PM Viktor Dukhovni wrote: On Wed, Dec 31, 2014 at 12:45:20AM -0500, John wrote: > https://tools.ietf.org/draft-ietf-dane-ops-07#section-8.1 > https://tools.ietf.org/draft-ietf-dane-ops-07#section-8.4 Sorry, Don't worry about it. https://tools.ietf.or

Re: DNSSEC - DANE

2014-12-31 Thread Viktor Dukhovni
On Wed, Dec 31, 2014 at 12:23:16AM -0500, John wrote: > >>smtpd_use_tls = yes > >>smtpd_tls_security_level = may > > Just so I get this right "/smtpd_tls_security_level = dane/" is acceptable, No, DANE TLS is for the sending (verifying) MTA only. -- Viktor.

Re: DNSSEC - DANE

2014-12-31 Thread Viktor Dukhovni
On Wed, Dec 31, 2014 at 12:45:20AM -0500, John wrote: > https://tools.ietf.org/draft-ietf-dane-ops-07#section-8.1 > https://tools.ietf.org/draft-ietf-dane-ops-07#section-8.4 Sorry, https://tools.ietf.org/html/draft-ietf-dane-ops-07#section-8.1 https://tools.ietf.org/html/draft-ietf-dane-

Re: DNSSEC - DANE

2014-12-30 Thread John
/smtpd_tls_security_level = dane/. postconf does not show any error for the above, but postfix itself does "fatal: invalid TLS level "dane" - I have switched back to may -- John Allen KLaM -- You are off the edge of the map, mate. Here there be monsters!

Re: DNSSEC - DANE

2014-12-30 Thread John
https://tools.ietf.org/draft-ietf-dane-ops-07#section-8.1 https://tools.ietf.org/draft-ietf-dane-ops-07#section-8.4 Both of the above return "object not found" I assume that as they are both draft docs they come and go as the editors update them. I will keep an eye on the site, hopefully catch t

Re: DNSSEC - DANE

2014-12-30 Thread John
On 12/30/2014 11:19 PM, Viktor Dukhovni wrote: On Tue, Dec 30, 2014 at 07:47:24PM -0500, John wrote: I have setup my DNS server for DNSSEC + DANE. I am using inline signing on Bind9 and it appears to be working for HTTPS access. I have a minor problem with key rolling, it seems to be a rather

Re: DNSSEC - DANE

2014-12-30 Thread Viktor Dukhovni
On Tue, Dec 30, 2014 at 07:47:24PM -0500, John wrote: > I have setup my DNS server for DNSSEC + DANE. I am using inline signing on > Bind9 and it appears to be working for HTTPS access. > I have a minor problem with key rolling, it seems to be a rather cumbersome > process at the m

Re: DNSSEC - DANE

2014-12-30 Thread John
On 12/30/2014 7:58 PM, wie...@porcupine.org (Wietse Venema) wrote: Wietse Venema: John: *Dec 30 19:16:35 bilbo postfix/smtp[3376]: warning: [127.0.0.1]:10024: dane configured with dnssec lookups disabled* Have you noticed the "unused parameter" warning for smtp_dns_supporta_level? That is, wh

Re: DNSSEC - DANE

2014-12-30 Thread Wietse Venema
Wietse Venema: > John: > > *Dec 30 19:16:35 bilbo postfix/smtp[3376]: warning: [127.0.0.1]:10024: > > dane configured with dnssec lookups disabled* > > Have you noticed the "unused parameter" warning for smtp_dns_supporta_level? That is, when you use the postconf command to show the configurati

Re: DNSSEC - DANE

2014-12-30 Thread Wietse Venema
John: > *Dec 30 19:16:35 bilbo postfix/smtp[3376]: warning: [127.0.0.1]:10024: > dane configured with dnssec lookups disabled* Have you noticed the "unused parameter" warning for smtp_dns_supporta_level? Wietse

DNSSEC - DANE

2014-12-30 Thread John
I have setup my DNS server for DNSSEC + DANE. I am using inline signing on Bind9 and it appears to be working for HTTPS access. I have a minor problem with key rolling, it seems to be a rather cumbersome process at the moment, but I suspect that it is me rather than the process. Having got it