On Sat, Oct 30, 2021 at 11:56:21AM +0100, Dominik Vogt via Exim-users wrote:

> > * Use a certiticate that verifyable without client-side changes., e.g. setup
> >   DANE on the server and/or use e.g. a letsencrypt cert.
> 
> It's not my server, but the colleague says it supports DANE.  I
> may look into that later.

Note, it is important to be clear about what "supports DANE" means,
becaue the inbound and outbound capabilities are independent of
each other.

For a receiving server to "support DANE", its hostname needs to be
in a DNSSEC-signed zone, and there must be TLSA records for the
port in questoin (25, or one of the submission ports).  And these
TLSA records needs to consistently match the certificate chain:

    * Which means proper service monitoring, including regular
      (daily or more frequent) certificate checks against the
      TLSA records.

    * Well thought out and executed key/cert rollovers that
      don't cause transient outages due to mismatch between
      the fresh cert and current or cached DNS data.

See the DANE resources links at (e.g.):

    https://stats.dnssec-tools.org/explore/?exim.org

    [ The secondary MX for exim.org is not yet in a
      DNSSEC-signed zone, so DANE to exim.org is
      subject to MiTM downgrades. ]

-- 
    Viktor.

-- 
## List details at https://lists.exim.org/mailman/listinfo/exim-users
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to