Hi Bright Star,

I like the idea of a CAless TLS trust layer with DNS(sec) based
certificates. I stumbled about DANE a while ago, it is working on some
browsers (chrome, firefox will probably follow; there is a add-on like
the dnssec plugin:
http://hu.reddit.com/r/netsec/comments/12up0t/dane_patrol_firefox_addon_fork_of_certificate/)
yet.

DANE is a marketing name of RFC 6698 https://tools.ietf.org/html/rfc6698

To get an adpotion in the mail world (and stuff like that, with 2-3
specifications involved, tls, dns and smtp) takes time and is usually
painfull (too many broken MTAs).

First, I never saw postfix compiled against gnutls, google showed some
bug reports regarding that, please correct me if I am wrong about that.

So if openssl would support DANE, life would be a lot easier. It is
similar to SNI (server name indication) gnutls was first, but after
openssl integrated it, adoption started to accelerate.

I see two ways to reach a first milestone on your goal

a) make postfix compile against gnutls
b) wait on the integration of DANE in openssl

I would favor b), just because IMHO it is probably faster then a),
having postfix compile/linking against two TLS library would not do
harm, it is just a lot of work. And encryption and authentication is not
something you want to have broken.

But the above scenarios would just be a first step, then you would need
to improve/add the DANE/TLS handling within postfix, make sure nothing
of the current TLS/SSL handling brakes during the integration.

I would be happy if we could improve postfix with DANE, I am just not a
good enough coder to do so. I would be willing to help with all the
other stuff (compiling, testing, documentation) of the process.

Greetings,
   Stefan

On 13/01/2013 08:34, Bry8 Star wrote:
> Hi,
> When can we expect a Postfix release, that will support DANE
> protocol ? so that it(postfix) can verify (using DANE & DNSSEC
> protocols) the signed (and free) SSL/TLS certificates(cert) (or
> fingerprints) which we can pre-add in TLSA, (CERT, HASTLS, etc) DNS
> (DNSSEC) records, and then it(postfix) will use those(cert) for
> secure (smtp) communication, and to verify SMTP servers.
> 
> Currently (Jan 12, 2013), the last+stable GnuTLS, now supports DANE,
> (and as of right now, OpenSSL (or any openssl modules) yet does not
> support DANE). Can postfix utilize DANE libraries from gnutls for DANE ?
> 
> And, it seems "Exim" (last+stable version) can already use server's
> DNSSEC supported local DNS resolver/server software, and so it(Exim)
> is able to show/add header info like "sender host verified by DNSSEC
> (AD)" in "Received:" meta/header, if DNSSEC protocol based
> authentication succeeded, or "host not verified by DNSSEC" message
> in header when failed:
> http://jpmens.net/2012/06/07/exim-mta-with-dnssec-verification-of-sender/
> (AD = Authenticated Data).
> And Exim also uses (or, can use) GnuTLS, (other than OpenSSL).
> 
> The DnsSec-Tools.Org site shares PATCH (developed by Sparta) for
> (older) Postfix (and other software) to support DNSSEC, can someone
> expert apply it(patch) on the last+stable postfix ?
> http://www.dnssec-tools.org/howtos/postfix-2.3.x-dnssec-howto.txt
> 
> Is there any other patch for postfix ? (for dane and dnssec
> functionalities).
> 
> Thank you (in advance),
> -- Bright Star.
> 
> 
> 
> References / More info:
> 
> DANE (DNS-based Authentication of Named Entities) :
> https://datatracker.ietf.org/wg/dane/
> 
> https://wiki.mozilla.org/Security/DNSSEC-TLS-details
> 
> http://www.dnssec.net/software
> 
> Compare MTA, MSA, etc:
> http://en.wikipedia.org/wiki/Comparison_of_mail_servers
> 
> Exim : ( Google+ ) :
> https://plus.google.com/101257968735428844827
> https://plus.google.com/101257968735428844827/posts/hbvE6f9nYuq
> 
> https://datatracker.ietf.org/doc/draft-ietf-dane-protocol/
> 
> https://www.dnssec-tools.org/wiki/index.php/Main_Page
> 
> http://www.internetsociety.org/articles/dane-taking-tls-authentication-next-level-using-dnssec
> 
> http://www.internetsociety.org/deploy360/resources/dane/
> 
> http://www.gnutls.org/manual/gnutls.html
> http://www.gnutls.org/manual/html_node/Verifying-a-certificate-using-DANE-_0028DNSSEC_0029.html
> 
> http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions#Tools
> 
> https://www.dnssec-deployment.org/wiki/index.php/Tools_and_Resources
> 
> https://addons.mozilla.org/en-us/firefox/addon/dnssec-validator/
> 
> https://addons.mozilla.org/en-us/firefox/addon/extended-dnssec-validator/
> 
> http://www.internetsociety.org/deploy360/blog/2013/01/verisign-labs-dane-demonstration-page-and-test-sites/
> 
> http://www.isc.org/software/bind/dnssec
> 
> http://www.nlnetlabs.nl/projects/dnssec-trigger/
> 
> http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_15-1/151_dane.html
> 
> https://github.com/pieterlexis/swede
> 
> http://dane.verisignlabs.com/
> http://tools.verisignlabs.com/
> 
> http://dyn.com/dane-dns-server-authentication-ca-flaws-ssl-security/
> 
> https://www.dns-oarc.net/oarc/services/odvr
> 
> http://www.internetsociety.org/deploy360/resources/hashslinger-a-tool-for-creating-tlsa-records-for-dane/
> 
> DNSSEC:
> RFC 5910: Domain Name System (DNS) Security Extensions Mapping for
> the Extensible Provisioning Protocol (EPP)
> RFC 4033: DNS Security Introduction and Requirements
> RFC 4034: Resource Records for the DNS Security Extensions
> RFC 4035: Protocol Modifications for the DNS Security Extensions
> RFC 4641: DNSSEC Operational Practices
> RFC 5155: (March 2008) introduces an alternative resource record,
> NSEC3, which provides additional measures against zone enumeration
> and permits gradual expansion of delegation-centric zones.
> 

Reply via email to