Update on stats 2019-05

Viktor Dukhovni ietf-dane at dukhovni.org
Sun Jun 2 04:26:47 CEST 2019


Summary:  The DANE domain count is now 1,149,012

	  The number of domains that return DNSSEC-validated replies
	  in response to MX queries is 9,874,472.  Thus DANE TLSA
	  is deployed on 11.63% of domains with DNSSEC.

Credits:  The coverage of DNSSEC domains continues to improve with
	  ongoing data support from Paul Vixie of Farsight Security.
	  Credits also due to ICANN for gTLD data via CZDS, and to
	  the TLD registries for .CH, .COM, .DK, .FR, .INFO, .IS, .LI,
	  .NL, .NU, .ORG and .SE.  More data sources of ccTLD
	  signed delegations welcome.

Appeal:	  The handful of providers with long-term broken DNSSEC
	  denial of existence are sadly making little progress to
	  update their buggy DNS implementations.  It would be
	  really great if (at least):

	       mijnhostingpartner.nl	(Many broken NSEC3 RRSIGs)
	       epik.com			(Wildcards missing from NSEC chain)
	       metaregistrar.nl		(Wrong empty non-terminal handling)
	       tiscomhosting.nl		(Missing wildcard NSEC for NODATA response)
	       dotserv.com		(invalid NSEC chain order)
	       movenext.nl		(NSEC replies don't cover wildcard)
	       nrdns.nl			(Malformed NSEC3 or ServFail)
	       binero.se		(NSEC3 chain names returned as NSEC!)

	  fixed their nameserver and/or zone provisioning code.  While
	  the O(10^3) affected domains are a small fraction of the
	  O(10^7) signed domains, they are a much larger fraction
	  of the signed domains for those particular providers.

Appeal:	  The number of domains with neglected outdated TLSA records,
	  has grown to ~500.  PLEASE *monitor* your deployment, and
	  implement a cert/key rollover process that does not (even
	  temporarily) disrupt the validity of your certificate
	  chain as compared to the published (cached) TLSA records:

	    https://github.com/baknu/DANE-for-SMTP/wiki/2.-Implementation-resources

	  If you're willing and able to help reach out to the
	  operators of MX hosts with misconfigured TLSA RRsets,
	  please get in touch.

As of today I count 1,149,012 domains with correct SMTP DANE TLSA
records at every primary MX host that accepts connections[1].  As
expected, the bulk of the DANE domains are hosted by the DNS/email
hosting providers who've enabled DANE support for the customer
domains they host.  The top 20 MX host providers by domain count
are:

  705488 one.com
  125798 transip.nl
   97267 domeneshop.no
   36238 active24.com
   32475 vevida.com
   24131 udmedia.de
   15856 flexfilter.nl
   12993 onebit.cz
   12327 zxcs.nl
   10961 bhosted.nl
    5999 netzone.ch
    5644 previder.nl
    3795 ips.nl
    3401 interconnect.nl
    2481 provalue.nl
    2287 nederhost.nl
    1628 nmugroup.com
    1574 yourdomainprovider.net
    1320 hi7.de
    1293 prolocation.net

The real numbers are surely larger, because I don't have access to
the full zone data for most ccTLDs, especially .no/.cz/.de/.eu/.be.
Speaking of countries, the IPv4 GeoIP distribution of DANE-enabled
MX hosts shows the below top 20 countries (each unique IP address
is counted, so multi-homed MX hosts are perhaps somewhat
over-represented).

  5221 TOTAL
  1758 DE, Germany
  1065 US, United States
   718 NL, Netherlands
   383 FR, France
   216 GB, United Kingdom
   175 CZ, Czechia
   116 CA, Canada
    88 SG, Singapore
    75 CH, Switzerland
    71 SE, Sweden
    54 DK, Denmark
    43 IE, Ireland
    43 AT, Austria
    41 FI, Finland
    36 AU, Australia
    34 PL, Poland
    34 BR, Brazil
    26 RU, Russia
    26 JP, Japan
    23 IN, India

IPv6 is still comparatively rare for MX hosts, and the top 20
countries by DANE MX host IPv6 GeoIP are:

  1914 TOTAL
   732 DE, Germany
   304 NL, Netherlands
   238 FR, France
   155 US, United States
   114 CZ, Czechia
    74 GB, United Kingdom
    39 SE, Sweden
    33 CH, Switzerland
    28 RU, Russia
    28 CA, Canada
    22 AT, Austria
    18 IE, Ireland
    14 NO, Norway
    13 DK, Denmark
    12 FI, Finland
    10 AU, Australia
     9 SI, Slovenia
     9 IN, India
     7 IT, Italy
     6 SK, Slovakia

There are 4392 unique zones in which the underlying MX hosts are
found, this counts each of the above providers as just one zone,
so is a measure of the breadth of adoption in terms of servers
deployed.

The number of published MX host TLSA RRsets found is 6639.  These
cover 7077 distinct MX hosts (some MX hosts share the same TLSA
records through CNAMEs).

The number of domains that at some point were listed in Gmail's
email transparency report is 245 (this is my ad-hoc criterion for
a domain being a large-enough actively used email domain).  Of
these, 129 are in recent (last 90 days of) reports:

  univie.ac.at             ruhr-uni-bochum.de     mailplus.nl
  gmx.at                   tu-darmstadt.de        markteffectmail.nl
  transip.be               tum.de                 minbzk.nl
  nic.br                   uni-erlangen.de        ouderportaal.nl
  registro.br              uni-muenchen.de        overheid.nl
  gmx.ch                   unitybox.de            pathe.nl
  open.ch                  unitymedia.de          photofacts.nl
  anubisnetworks.com       web.de                 photofactsacademy.nl
  fmc-na.com               egmontpublishing.dk    politie.nl
  gmx.com                  netic.dk               previder.nl
  habr.com                 sitnet.dk              rijksoverheid.nl
  hotelsinduitsland.com    tilburguniversity.edu  rotterdam.nl
  kpn.com                  zone.eu                rvo.nl
  mail.com                 dovecot.fi             ssonet.nl
  one.com                  ac-strasbourg.fr       transip.nl
  solvinity.com            insee.fr               truetickets.nl
  t-2.com                  octopuce.fr            utwente.nl
  telfort.com              web200.hu              uvt.nl
  trashmail.com            comcast.net            xs4all.nl
  xfinity.com              dd24.net               domeneshop.no
  xfinityhomesecurity.com  dns-oarc.net           handelsbanken.no
  xfinitymobile.com        gmx.net                uib.no
  active24.cz              habramail.net          webcruitermail.no
  atlas.cz                 hr-manager.net         atelkamera.nu
  centrum.cz               inexio.net             aegee.org
  cuni.cz                  mpssec.net             debian.org
  klubpevnehozdravi.cz     procurios.net          freebsd.org
  onebit.cz                riseup.net             gentoo.org
  smtp.cz                  t-2.net                ietf.org
  virusfree.cz             transip.net            isc.org
  volny.cz                 transversal.net        netbsd.org
  allsecur.de              vevida.net             openssl.org
  bayern.de                xs4all.net             ozlabs.org
  bund.de                  bhosted.nl             samba.org
  elster.de                bluerail.nl            torproject.org
  fau.de                   boekwinkeltjes.nl      asf.com.pt
  freenet.de               corpoflow.nl           deborla.pt
  gmx.de                   denhaag.nl             moikrug.ru
  jpberlin.de              dictu.nl               handelsbanken.se
  lrz.de                   digid.nl               minmyndighetspost.se
  mail.de                  hierinloggen.nl        personligalmanacka.se
  mensa.de                 hr.nl                  skatteverket.se
  posteo.de                intermax.nl            govtrack.us

Of the ~1.15 million domains, 2514 have "partial" TLSA records,
that cover only a subset of the (secondary) MX hosts.  While this
protects traffic to some of the MX hosts, such domains are still
vulnerable to the usual active attacks via the remaining MX hosts.

The number of domains with incorrect TLSA records or failure to
advertise STARTTLS (even though TLSA records are published) stands
today at 560.  Some of these have additional MX hosts that don't
have broken TLSA records, so mail can still arrive via the remaining
MX hosts.  A partial list is available at:

  https://github.com/danefail/list

To avoid getting listed, please make sure to monitor the validity
of your own TLSA records, and implement a reliable key rotation
procedure.  See:

    https://dane.sys4.de/common_mistakes
    https://github.com/baknu/DANE-for-SMTP/wiki/2.-Implementation-resources

    http://tools.ietf.org/html/rfc7671#section-8.1
    http://tools.ietf.org/html/rfc7671#section-8.4

After eliminating parked domains that do not accept email, the
number of "real" email domains with bad DNSSEC support stands at
1318.  The top 10 name server operators with problem domains are:

  537 mijnhostingpartner.nl
  109 epik.com
   40 metaregistrar.nl
   34 tiscomhosting.nl
   34 dotserv.com
   33 movenext.nl
   31 nrdns.nl
   30 binero.se
   29 domaincontrol.com
   27 sylconia.net

  [ Sadly epik.com is back, after resolving all issues last month,
    it seems while the reported domains were resolved, the underlying
    systemic issue was not. ]

If anyone has good contacts at some of these providers, please
encourage them to remediate not only the broken domains (I can send
them a list), but also the root cause that makes the breakage
possible.

Eleven of the domains all whose nameservers have broken denial of
existence appear in the last 120 days of Google transparency reports:

  coren-sp.gov.br
  trt01.gov.br
  trtrio.gov.br
  trt1.jus.br
  trtrj.jus.br
  key.com
  keybank.com
  bluehosting.host
  rackeo.host
  sauditelecom.com.sa

-- 
        Viktor.

[1] Some domains deliberately include MX hosts that are always
down, presumably as a hurdle to botnet SMTP code that gives up
where real MTAs might persist.  I am not a fan of this type of
defence (it can also impose undue latency on legitimate email).
However, provided the dead hosts still have TLSA records, (which
don't need to match anything, just need to exist and be well-formed)
there's no loss of security.


More information about the dane-users mailing list