Conversation

I wonder how long it'll be before large companies require DNSSEC (and verify) + TLS for delivering email 2FA codes. My guess is never, despite the relative ease that those codes can be spied upon.
4
14
Replying to
Need TLSA records (DANE) in addition to DNSSEC to provide TLS authentication for email. MTA-STS is a much weaker approach. Requires DNS records and an HTTPS web server which it uses to fetch an mta-sts.txt file similar to dynamic (no preload) HSTS if you only used http:// URLs.
2
9
Replying to
Yes, I was thinking of mentioning TLSA records, but so many people don't even do the few I mentioned. (I have TLSA records deployed for my mail server, but I don't know if my MTA will check and verify the TLSA record?).
2
Replying to
Enabling it for Postfix simply requires setting up unbound as your resolver and then enabling 2 configuration options: smtp_dns_support_level = dnssec smtp_tls_security_level = dane Enables opportunistic dane where it uses it when there are TLSA records and prevents downgrades.
3
5
Replying to and
And of course making sure to list only loopback addresses in /etc/resolv.conf or wherever your system stores resolver settings. I hope to revamp opportunistic DANE support in Postfix 3.8, making the residual security policy for non-DANE MX hosts more flexible than fixed "may".
1
2