Thank you, all, for your replies!

On 2025/10/30 18:56, Viktor Dukhovni via mailop wrote:
> There is a non-trivial minority of SMTP servers that have self-signed
> certificates.  Barring some reason to expect otherwise (MTA-STS policy?),
> SMTP clients broadly tolerate unvalidatable server certificates,
> including self-signed as one of many ways that can happen.  That's just
> basic unauthenticated opportunistic TLS.

I see. So, a CA signed certificate would be the way to go then.

I do have an mta-sts policy, which would be causing the havoc with Gmail
(I never thought of that!).

Not sure why Protonmail also drops mails to my server, but I have
reached out to their support and hope to receive an explanation.

Considering that some big players (e.g. Gmail and Fastmail) only use
mta-sts (and don't want to go near DANE[0]), it would not make sense to
not use mta-sts? In which case a CA cert would be required.

> 
> For example, the backup MX of the Armenian NIC, "isoc.amnic.net" has
> a self-signed cert and matching TLSA records:

I can't see that they have an mta-sts policy.

> 
> Likewise both MX hosts of a Czech health insurance provider:
> 
>     cpzp.cz. IN MX 10 posta.cpzp.cz.
>     cpzp.cz. IN MX 30 postc.cpzp.cz.

Nor do they have a mta-sts policy that I could find.

> So you should be able to field a DANE-validatable self-signed cert and
> not have trouble receiving mail from either non-DANE SMTP clients or
> DANE-enabled SMTP clients (provided the TLSA records match that cert or
> its public key).

If I understand correctly, a mta-sts policy would be in the way of this
working. I suppose the process would be (from such a server's point of
view):

1. We don't use DANE, so check for MTA-STS
2. MTA-STS says: need CA cert
3. Hey, I am presented a self-signed cert! -> Bye!

>         name = *.pm.me
>         name = *.protonmail.ch
>         name = *.protonmail.com
>         name = *.protonvpn.ch
>         name = *.protonvpn.com
>         name = protonmail.com
>         depth = 0
>           Issuer CommonName = R13
>           Issuer Organization = Let's Encrypt

So, there we go. Protonmail could then, if I understand correctly,
receive emails from Gmail, Fastmail etc (no DANE, but MTA-STS) because
they have a CA cert.

If I understand all this correctly, then that would mean that I would
need to either drop mta-sts (seems counter-productive), or use a CA
certificate.

And, in the latter case, if memory serves me well, if I re-use the same
private key for the certificate generation, together with a "3 1 1" tlsa
record, then I won't have to change the tlsa record every time the
certificate is renewed (which would be a pain, especially with even
shorter turnaround times for LE certs next year). I also seem to
remember a tool called 'danebot' by you, Viktor (if I may address you
so), as a wrapper around certbot to preserve the private key.

Thank you all for your enlightening replies!

Kind regards,
    Edmund


[0]: https://www.fastmail.com/blog/dnssec-dane/
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to