On Sun, Feb 06, 2022 at 12:34:02PM -0500, Wietse Venema wrote:
> Postfix turns on DNSSEC when DANE is enabled. Postfix does not turn on
> DNSSEC by default, because that is not a practical option at this
> time.

On Sun, Feb 06, 2022 at 06:38:10PM +0100, Joachim Lindenberg wrote:
> There is a distinct setting smtp_dns_support_level = dnssec in
> main.cf. Doing the extra lookups seems doable to me (not looking at
> the source code so far).

It's not so much that enabling RES_USE_DNSSEC is impractical, but rather
that it is often ineffective, because many Postfix administrators don't,
either at all or exclusively, use a local validating resolver.

When the configured iterative DNS resolver is remote, trusting its AD
bit does not add meaningful protection against active MiTM attacks.

This is why DNSSEC is off by default, and should only be enabled by
users who make the effort to deploy a local validating resolver, and
ensure that /etc/resolv.conf lists only 127.0.0.1 (and/or ::1, or
some suitable "loopback" address).

As for refactoring DANE as a conditional override of local TLS policy,
rather than a replacement of local policy, this has been discussed (see
the list archives), but we haven't settled on a design.

I don't think it makes sense for DANE to unconditionally trump local
policy, it must be possible to disable it for some or all domains.

However, making it possible for DANE to fall through to ambient
local policy does make sense.  We just need a sensible design
that is backwards compatible and sufficiently expressive in
policy tables etc.

The basic observation is perhaps that "dane-only" is a "real" local
policy security level, but "dane" (RFC7672 "Opportunistic DANE TLS") is
perhaps not a security level, but rather a conditional override of local
policy to "dane-only" when remote TLSA records are detected.

This suggests that "Opportunistic DANE TLS" needs a separate control
knob, that augments rather than conflicts with other local policy
settings, but can also be turned on/off in the policy table.

This can also resolve the conflict between MTA-STS and DANE, with
DANE winning when enabled (thus conforming to RFC8461).

So the issue is not so much whether to enable opportunistic DANE TLS by
default, but rather whether enabling it conflicts with specifying the
ambient local policy that is effect absent DANE TLSA records.

-- 
    Viktor.

Reply via email to