Conversation

Was mich am meisten verwundert, dass der Bund kein "ordentliches" Zertifikat für SMTP verwendet.
Quote Tweet
Weiß jemand, warum beim bund.de die #krypto config beim genaueren Hinsehen kaputt ist: * DNSSEC: ok * SMTP, 25/tcp: Zertifikat Root-CA nicht allgem. trusted * SMTP, 25/tcp: TLSA record: ok * bund.de (Port 443): TLSA record kaputt cc @BSI_Bund
4
2
Replying to and
There are pros and cons to ensuring a valid a cert from a public CA. The positives are: * A few brain-dead MTAs do opportunistic TLS wrong, they send in cleartext when TLS auth fails, instead of continuing anyway w/ STARTTLS. Given a valid cert they use TLS. ...
2
3
* You can, if you wish, publish an MTA-STS policy, and maintain associated DNS TXT records to enable some senders to use MTA-STS. The negatives are: * You have to rotate the certificate in time to keep it valid. * This can increase the odds of a mismatch with any DANE TLSA RRs.
2
2
Email server security depends on pinning the private key via a TLSA record. That means the regular certificate renewal process needs to reuse the same private key. Please read the next tweet in the thread. You're responding to this tweet out of context.
Quote Tweet
Replying to @DanielMicay @VDukhovni and 2 others
You add a TLSA record for the new certificate, then once enough time has passed switch over to it and tell certbot to delete the old certificate. MUAs usually expect a CA issued certificate for the submission ports and don't understand TLSA records so it's useful beyond MTA-STS.
1
If you want to automate key rotation, you can do that. If you want to rotate the private key every week, that's entirely possible. You need to obtain a new certificate with the new private key, add a new TLSA record, wait and then rotate over to using the new certificate.
1
Don't need to rotate the key based on the Let's Encrypt schedule where you renew every 60 days and certificates expire after 90 days. Once you remove the previous TLSA record after rotation, prior certificates won't pass DANE verification. You could do it way more frequently.
1
If you automate handling key rotation, which requires rotating the pins, then you can determine the rate that it happens. The Let's Encrypt rate limit is quite high although you would want to leave yourself leeway rather than using all of it as part of regular usage.
1
Show replies
They do. Just have to look into my postfix logs. ;-) Of course MTA-STS has benefits, as DANE/DNSSSEC has. Both helpsecuritywise and I am in favor using it whenever it's possible. But if a federal government IN THE INTERNET is not using a trusted chain I may scratch my head ;-)