Conversation

I wonder how long it'll be before large companies require DNSSEC (and verify) + TLS for delivering email 2FA codes. My guess is never, despite the relative ease that those codes can be spied upon.
4
14
Replying to
Need TLSA records (DANE) in addition to DNSSEC to provide TLS authentication for email. MTA-STS is a much weaker approach. Requires DNS records and an HTTPS web server which it uses to fetch an mta-sts.txt file similar to dynamic (no preload) HSTS if you only used http:// URLs.
2
9
Replying to and
DANE is really easy to deploy if you're already using DNSSEC on the domains receiving mail and your MX domain(s). You just add a single TLSA record pinning leaf key for the MX server federation port and then you can add another alongside it when phasing in a key for rotation.
1
2
Replying to
Yeah, I've ran across PLENTY of mail servers that don't do retry. It's most common among spammers, but there are plenty of legitimate businesses that don't honor 4xx codes (or have a timeout to be so long it's useless).
1