On Thu, Sep 03, 2020 at 06:09:23PM -0400, Bill Cole wrote: > > Your resolver claims to have validated the answer (the AD bit is set), > > what do you get with "posttls-finger"? > > [root@be03 ~]# posttls-finger mail.deaecom.gov > posttls-finger: Connected to mail.deaecom.gov[149.101.26.25]:25 > posttls-finger: < 220 ****************
Already here we see that "posttls-finger" did not report trouble looking up the TLSA RRs, as it would with e.g. "assugo.be" (one of the 300+ domains affected by broken denial of existence via axc.nl nameservers): $ posttls-finger assugo.be posttls-finger: warning: DANE TLSA lookup problem: Host or domain name not found. Name service error for name=_25._tcp.assugo.be type=TLSA: Host not found, try again posttls-finger: warning: DANE TLSA lookup problem: Host or domain name not found. Name service error for name=_25._tcp.assugo.be type=TLSA: Host not found, try again posttls-finger: Failed to establish session to assugo.be via assugo.be: TLSA lookup error for assugo.be:25 posttls-finger: warning: DANE TLSA lookup problem: Host or domain name not found. Name service error for name=_25._tcp.assugo.be type=TLSA: Host not found, try again posttls-finger: Failed to establish session to assugo.be via assugo.be: TLSA lookup error for assugo.be:25 > > Bottom line, if name resolution is failing, Postfix is usually just > > the messenger, the bad news is coming from upstream. > > Oh, I get that. Really. > > Since I can't see any other incidents like this even with seemingly > similar DNS circumstances, I've reset to "smtp_tls_security_level = > dane" and chalked up this incident to "gremlins" pending a recurrence. A > test message to a bogus address in the target domain with the PIX > workaround "disable_esmtp" shut off did establish a TLS session, so > whatever actually caused it seems to have been transient. Indeed "transient" seems to be the verdict, and perhaps explains why others (myself included) could not reproduce the reported symptoms. -- Viktor.