I wonder how long it'll be before large companies require DNSSEC (and verify) + TLS for delivering email 2FA codes.
My guess is never, despite the relative ease that those codes can be spied upon.
Conversation
Replying to
Need TLSA records (DANE) in addition to DNSSEC to provide TLS authentication for email.
MTA-STS is a much weaker approach. Requires DNS records and an HTTPS web server which it uses to fetch an mta-sts.txt file similar to dynamic (no preload) HSTS if you only used http:// URLs.
2
9
Replying to
Yes, I was thinking of mentioning TLSA records, but so many people don't even do the few I mentioned. (I have TLSA records deployed for my mail server, but I don't know if my MTA will check and verify the TLSA record?).
2
Replying to
Enabling it for Postfix simply requires setting up unbound as your resolver and then enabling 2 configuration options:
smtp_dns_support_level = dnssec
smtp_tls_security_level = dane
Enables opportunistic dane where it uses it when there are TLSA records and prevents downgrades.
3
2
5
And of course making sure to list only loopback addresses in /etc/resolv.conf or wherever your system stores resolver settings.
I hope to revamp opportunistic DANE support in Postfix 3.8, making the residual security policy for non-DANE MX hosts more flexible than fixed "may".
1
1
2
That would be nice. We enforce TLS for receiving mail for mail.grapheneos.org already and we had never received a non-spam email without TLS before we started doing it. Currently can't easily do it for sending mail since we use opportunistic dane and it's the same setting.


