Conversation

I wonder how long it'll be before large companies require DNSSEC (and verify) + TLS for delivering email 2FA codes. My guess is never, despite the relative ease that those codes can be spied upon.
4
14
Replying to
Need TLSA records (DANE) in addition to DNSSEC to provide TLS authentication for email. MTA-STS is a much weaker approach. Requires DNS records and an HTTPS web server which it uses to fetch an mta-sts.txt file similar to dynamic (no preload) HSTS if you only used http:// URLs.
2
9
Replying to
Yes, I was thinking of mentioning TLSA records, but so many people don't even do the few I mentioned. (I have TLSA records deployed for my mail server, but I don't know if my MTA will check and verify the TLSA record?).
2
Replying to
Enabling it for Postfix simply requires setting up unbound as your resolver and then enabling 2 configuration options: smtp_dns_support_level = dnssec smtp_tls_security_level = dane Enables opportunistic dane where it uses it when there are TLSA records and prevents downgrades.
3
5
Replying to and
So if you don't send mail to gmail.com at least once every 24h, it will expire and revert back to the insecure check to see if it can fetch the mta-sts.txt file where it fails open and allows insecure connection without authentication if anything about that fails.
1