Conversation
If only it had a hall of shame for senders that deliver to wrong...
1
Replying to
By all means, build a tool that does this. Instructions and code are linked at the bottom. This tool doesn't, because that would make it less useful as a tool (i.e. knowing where you stand without social risk).
2
1
To clarify: I think both are useful (with & without the HoS). I built one. I'll be glad to see the other built as well.
1
1
I think the use would primarily be users checking if their mail providers are secure. As a nice example, ProtonMail claims to support DANE but someone in #grapheneos tested with havedane.net and ProtonMail happily delivered a message to wrong.havedane.net...
It would also be nice to have a 4th test using a domain with a valid DANE record but without DNSSEC. It's possible to enable DANE verification without DNSSEC, at least with Postfix, and ideally that kind of misconfiguration would be detected.
3
1
While it's a misconfiguration per the standards, it's still far better than not having DANE at all. MITM then requires ability to intercept both connection and DNS channel.
1
Show replies
I have a support ticket reply from protonmail stating they don't. 😞


