On 15/11/2018 07.32, J. Thomsen wrote:

> Recently I have been struggling with configuring DANE and DNSSEC for
> a domain, for which my DNS is authoritative.

I applaud your struggle.

> DNSSEC is not the problem, but there are issues in setting up DANE
> in postfix, hvis could be improved

Your client side DNSSEC setup may be a problem, see below:

> 2) problem with no ad flag when the resolver is querying an
> authoritative DNS

To use DNSSEC you typically need secure access to a recursive resolver
that supports DNSSEC.  This could be a library linked to your app, or
a server (that you can trust) running someplace.

On Fedora you may want to check out the dnssec-trigger package.

> In this case Postfix is running on the same server as the
> authoritative server and using it as a recursive resolver.

So you want to make sure that any recursive resolver functionality is
not made publicly available.  Your authoritative server for your own
domain must, of course, be publicly facing.

I run separate DNS servers for serving authoritative data for public
domains and for recursive lookup (and caching) for local applications.

Either application or both can be bind (named) or unbound or whatever
software.

> I had to change the resolv.conf file to an external DNS, but for
> various reasons this will not work properly in all cases.

Remember, you must trust that external DNS server and every (plain
text or unenciphered) network hop in between.

More typically you want to point your resolv.conf to a local unbound
or named server.

> This issue should be solved, and at least be mentioned in the
> documentation for DANE, as it can be a showstopper.

If I understand you correctly, this is a DNSSEC issues, more so than a
postfix issue.

> 3) TLS SNI

> The documentation states, that there are no plans to implement SNI
> in the Postfix SMTP server.
> Is this still valid?

With email, the MX record decouples the domain in an email address
with the domain(s) in the cert that your mail server may present.

> From my recent experience I can see, that other mailservers do
> implement it.

Do they?  I do in my own mail server and client.  Not sure how
generally useful it all is.  What email software cares about such
things?

> With the easy certificates obtainable from LetsEncrypt and many
> virtual host on the same server, it may be time to reevaluate this
> policy.

Your email domains may use MX records to point email delivery to any
other set of servers, identified by any other domains.

> Also to eliminate single points of failure.

I have no idea how SNI could relate to such issues.  Please explain.


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to