On Wed, Sep 02, 2020 at 11:11:32PM -0400, Bill Cole wrote:

> > For the domain above, I am able to resolve the TLSA RRs via my 
> > resolver.
> 
> Able to resolve the non-existence, yes. Me too.

See below.

> Yes, I see the same:
> 
> [root@be03 ~]# dig @127.0.0.1 _25._tcp.mail.deaecom.gov. tlsa

That's NOT the same, you're not asking for "+dnssec", which Postfix does
do when resolving DANE TLSA records.

> ; <<>> DiG 9.16.6 <<>> @127.0.0.1 _25._tcp.mail.deaecom.gov. tlsa
> ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38074
> ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

Your resolver claims to have validated the answer (the AD bit is set),
what do you get with "posttls-finger"?

> ;; MSG SIZE  rcvd: 125

For lack of the DO bit, the respose is considerably smaller than it
would otherwise be.  What resolver does Postfix use?  Is the SMTP
client chrooted?  What's in /etc/resolv.conf?

> I do not understand why Postfix didn't see that as a reason to give up 
> on DANE.

Postfix uses the traditional BSD stub resolver API, (i.e. libc on many
modern systems, formerly libresolv).  Whatever it sees is what Postfix
sees.

> There's a local instance of Unbound operating as a caching recursive 
> resolver, so I don't think the UDP edge cases apply: it should be doing 
> the right thing in regards to using TCP as needed.

Well unbound might well have been failing to resolve this domain for
some reason, you can also test with "unbound-host" and also try dnsviz:

    https://dnsviz.net/d/_25._tcp.mail.deaecom.gov/X1BycA/dnssec/

which shows a working domain, be it with a few too many signatures
in the graph.  All the usual public resolvers are able to validate
it:

    https://dnsviz.net/d/_25._tcp.mail.deaecom.gov/e/218995/dnssec/

Is your unbound forwarding to any of them, configured to use DoH or DoT
perhaps?  Bottom line, if name resolution is failing, Postfix is usually
just the messenger, the bad news is coming from upstream.

-- 
    Viktor.

Reply via email to