Dear Viktor,

On 09/26/18 16:46, Paul Menzel wrote:

> On 09/26/18 09:37, Viktor Dukhovni wrote:
> 
>>> On Sep 26, 2018, at 2:57 AM, Bernhard Schmidt wrote:
>>>
>>> Large parts of the german universities now use the DFN MailSupport 
>>> (= inbound mailrelaying and filtering by DFN). The MX records are 
>>> in mx.srv.dfn.de, which is not signed (whole dfn.de is not signed).
>>> So you can have your own zone DNSSEC enabled, but not the one with
>>> the MX.
>>
>> Good to know.  Thanks.
> 
> Yes, that is what I meant. Bernhard, thank you for answering and
> clarifying that.
> 
>>> I heard they are working on this. This is also a blocker of our 
>>> project to have DANE-secured SMTP transport for all bavarian 
>>> universities.
>>
>> I wish them luck (really sound planning and execution, luck has 
>> little to do with it).
> 
> Unfortunately, to my knowledge, it’s not high on their to-do list.
> Only a few of their clients have requested this feature explicitly.
> I’ll work on raising awareness. Bernhard, all the Bavarian
> institutions should open a support ticket at the DFN mail support.
> It’s my understanding, that this would influence the priority.
> 
>> I also hope that the plan includes securing the downstream hop from 
>> the DFN gateway to the client institution, unless DFN is also 
>> providing IMAP, Webmail, ...
> 
> I do not know, how the downstream hop is secured currently. Either
> hard coding the IP address of the MTA, using certificates or just
> DANE would be feasible. We should do that for our mail system.
> Thank you for the reminder.

My colleagues already set up TLSA records for mx.molgen.mpg.de [3].
So I’ll ask the mail support to enable dane-only for that connection.

> For the record, the DFN network has it’s own network infrastructure
> with “cables” and network gear operated over Germany, so it’s not
> easy for somebody “from the Internet” to eaves drop [1][2]. Common
> methods for securing the transfer should be used nevertheless.


Kind regards,

Paul


> [1]: https://www.dfn.de/xwin/faserplattform/
> [2]: https://www.dfn.de/fileadmin/1Dienstleistungen/XWIN/Topologie.pdf
[3]: $ /usr/sbin/posttls-finger -t30 -T180 -c -L verbose,summary 
mx.molgen.mpg.de
posttls-finger: initializing the client-side TLS engine
posttls-finger: using DANE RR: _25._tcp.mx.molgen.mpg.de IN TLSA 3 1 2 
02:E4:F7:97:85:C7:08:1D:84:63:1A:23:A4:EC:B1:B6:26:24:1F:DC:68:D0:FA:80:B1:10:EF:5E:4C:2C:AF:5E:3F:B9:59:9C:6B:EA:D2:50:4E:4A:BB:6E:2A:73:94:14:11:46:65:F1:69:5C:ED:D7:80:E6:40:5F:19:7E:33:D6
posttls-finger: setting up TLS connection to mx.molgen.mpg.de[141.14.17.8]:25
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: TLS cipher list 
"aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH:!aNULL"
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: depth=3 verify=0 
subject=/C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche 
Telekom Root CA 2
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: depth=3 verify=1 
subject=/C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche 
Telekom Root CA 2
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: depth=2 verify=1 
subject=/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: depth=1 verify=1 
subject=/C=DE/O=Max-Planck-Gesellschaft/CN=MPG CA/emailAddress=mpg...@mpg.de
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: depth=0 verify=1 
subject=/C=DE/ST=Berlin/L=Berlin/O=Max-Planck-Gesellschaft/OU=Max-Planck-Institut
 fuer molekulare Genetik/CN=mx.molgen.mpg.de
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: depth=0 matched end entity 
public-key sha512 
digest=02:E4:F7:97:85:C7:08:1D:84:63:1A:23:A4:EC:B1:B6:26:24:1F:DC:68:D0:FA:80:B1:10:EF:5E:4C:2C:AF:5E:3F:B9:59:9C:6B:EA:D2:50:4E:4A:BB:6E:2A:73:94:14:11:46:65:F1:69:5C:ED:D7:80:E6:40:5F:19:7E:33:D6
posttls-finger: mx.molgen.mpg.de[141.14.17.8]:25: subject_CN=mx.molgen.mpg.de, 
issuer_CN=MPG CA, 
fingerprint=76:A9:04:3A:1E:27:1B:3A:28:9A:C1:A8:9A:64:C9:D0:FB:14:7F:D9, 
pkey_fingerprint=6A:2A:F0:14:CD:75:B2:D2:58:5A:50:83:F2:DF:A4:8A:4A:E9:66:8E
posttls-finger: Verified TLS connection established to 
mx.molgen.mpg.de[141.14.17.8]:25: TLSv1.2 with cipher 
ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to