On 2026-02-07 at 10:33:36 UTC-0500 (Sat, 7 Feb 2026 16:33:36 +0100)
Dmitriy Alekseev via Postfix-users <[email protected]>
is rumored to have said:

UA TLD support dnssec?;)

It seems so...

$ dig +dnssec ua. DS

; <<>> DiG 9.20.18 <<>> +dnssec ua. DS
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57286
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
; COOKIE: e73dd8ccd9f95cd50100000069875be1f190edc4365aeee2 (good)
;; QUESTION SECTION:
;ua.                            IN      DS

;; ANSWER SECTION:
ua. 86400 IN DS 51024 13 4 61195CABB323F940314D1BBEC97F4EBA54D2D7BA49AA244948C8C298 44E43A42293EE100841009FBFE85F1AB7CEFFACF ua. 86400 IN DS 51024 13 2 1BDCA65B3BA927EFB64909637C10ADF90763EA7AB5D0AC1597C66CD6 C6CAEB6C ua. 86400 IN RRSIG DS 8 1 86400 20260220050000 20260207040000 21831 . JrFdhJjc9L9scB4L6RKcJrZgQhryuT0l6NaZbNfuXi3uGAxAAd+VNBNm SdUWNJpLk96EGMJZElZKyw29brg2XXt2PoLmX1DQ0Wnl5P3PHMT3IYZw nHkREgXBB/DgSdC7Cp5KL/xOLtXUF0TH4x2+p7zm3vmfeMiM/lOQ3ch7 VqjKxTUj8C/FpHKjJDmOFYC0Bh/2MafuxLQMBV8ztaHW5RVhOFNIRLya Da+P9JYIW2AiOpBfBPrDRWMCmOg5qhjlAHG9OVi+cAqSWeBw7ZsE0f7X dH7mXWuY5eNzsmzVVANGskGwK/jbuWbXicfe7SYlcqCoILRF2O1cmt4y pPdm1A==

;; Query time: 3 msec
;; SERVER: 192.168.254.17#53(192.168.254.17) (UDP)
;; WHEN: Sat Feb 07 10:36:01 EST 2026
;; MSG SIZE  rcvd: 458




--
*Best Regards,*
Dmitriy Alekseev
DevOps Engineer

On Sat, 7 Feb 2026, 15:20 Viktor Dukhovni via Postfix-users, <
[email protected]> wrote:

On Sat, Feb 07, 2026 at 03:02:46PM +0100, Dmitriy Alekseev via
Postfix-users wrote:

but due to low level of dnssec spreading (as some tlds still fail to
add ability for it, as well as domain owners not interested in
enabling it even when they can).

Lack of TLD support is largely a thing of the past, all gTLDs and all
the major ccTLDs support DNSSEC, the only exceptions are a minority (77
out of 248) of less technically sophisticated ccTLDs:

ae al ao aq as ba bb bo bs cd cf cg ck cu cv cw dj do eg fk gb gf gh gm gp gq gt gu hm im iq jm jo kh km kn kp mh mk mo mp mq mt mv mw mz ne ng ni np nr om pa pf pk pn ps qa sd sl sm so st sv sy sz tc td tg tj tk to
    va vg vi ye zw

and a handful (15 out of 61) of their related IDNA domains:

    xn--d1alf xn--fzc2c9e2c xn--j1amh xn--lgbbat1ad8j xn--mgb9awbf
xn--mgba3a4f16a xn--mgbaam7a8h xn--mgbc0a9azcg xn--mgbpl2fh xn--mgbtx2b
    xn--mix891f xn--node xn--ogbpf8fl xn--wgbl6a xn--ygbi2ammx

And keeping DNS zones correctly signed is also mostly a thing of the
past, since the current generation of authoritative servers fully
automate zone resigning, and even key rotation, if you set up a key
rotation policy (with just a bit of care to not choose a policy that
performs key rotation even if the matching DS records don't show up int
he parent zone).

Don't need to forget about complexity in operation on dns changes on
cert rotation or requirements to reuse same private key to not rotate tlsa I think it not get supported in other protocols and just CA trust
is used.

There are robust tools to automate TLSA cert rotation and also
occasional key rollover, the knowledge to use them has sadly not yet
reached some the adopters.  Too many HOWTO guides are giving rather
incomplete advice...

--
    Viktor.  🇺🇦 Слава Україні!
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]


--
Bill Cole
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to