DANE SMTP behavior with inconsistent initial CNAME response
Gael Roualland
groualland at proofpoint.com
Thu Dec 6 18:37:09 CET 2018
On 6/12/18 17:16, Viktor Dukhovni wrote:
>> 1) MX lookup for the domain: returns "1 mail.domain.tld." (from zone A)
>
> This is unsigned, and so you could stop DANE processing at that
> point. However, some DANE implementations (e.g. recent Postfix
> versions) still employ DANE even for domains with "insecure" MX
> records, when the selected MX host is in a signed zone.
This is what we offer as an option too (default on) and which is enabled
in that case.
However we could still have a similar behavior if the original domain is
signed, but the MX hostname is in a non-signed zone or an alias to a
non-signed name.
>> 2) A/AAAA lookup for "mail.domain.tld": returns "A 192.168.1.1" through
>> "CNAME domain.tld." (from zone B)
>
> Yes, that can happen, what a mess. The destination domain's DNS
> is broken, and DANE or not, it is lucky to get any mail at all.
Indeed...
>> 3) Since the A reply is insecure and is from a CNAME alias, as per
>> §2.2.2 of the RFC we issue an explicit CNAME request on
>> "mail.domain.tld." to check if this is secure: this returns a NODATA
>> answer (from zone A)
>
> So long as the NODATA answer is "insecure", the fact that it denies
> the CNAME's existence is tolerable, the sole purpose of the CNAME
> lookup is probe for DNSSEC in the original zone, and an "insecure"
> NODATA shows the zone to be unsigned.
Agreed, we could look only at the validation result here.
But assuming we get the same inconsistency in a secure way, then would
that also be enough to apply DANE using the initial name as the TLSA
domain ?
>> In that case, our implementation considers that having a NODATA answer
>> to a CNAME that it received previously in a former response is
>> suspicious, and temporary fails this delivery attempt as if we hit a DNS
>> error.
>
> I would suggest that it is OK to be less "suspicious". While zone
> content can vary between nameservers, the DNSSEC status of a domain
> should be robust.
OK.
> Your instinct is reasonable. It is OK to continue with this domain.
>
> By the way, it is news to me that Proofpoint supports DANE.
> Congratulations and welcome to the club! Do you support both
> DANE-EE(3) and DANE-TA(2)? The most recent opensource Sendmail
> snapshot I can find still has fairly minimal DANE support. Is there
> somewhere a public description of DANE support in Proofpoint?
Thanks.
I'm referring to the Cloudmark Security Platform product. Cloudmark was
acquired by Proofpoint a year ago. I can't speak for DANE support status
in other Proofpoint products.
We do support DANE-EE and DANE-TA, and try to adhere to the
specification as much as possible. We have a blog post about it at [1]
but that doesn't go into technical implementation details.
Gaël.
[1] https://blog.cloudmark.com/2017/03/27/dane-and-email-security/
More information about the dane-users
mailing list