[dns-operations] TLSA records on MX

Zuleger, Holger, Vodafone DE holger.zuleger at vodafone.com
Tue Jun 11 07:59:39 UTC 2013


> > The Certificate provided by spodhuis.org authenticates the 
> target mx.spodhuis.org,
> > but not the query domain (which is spodhuis.org).
> 
> To be clear: for mail delivery, you want:
>   http://tools.ietf.org/html/draft-ietf-dane-smtp-01
> 
> The SMTP case is not quite the same as the SRV case, thus 
> there being a
> distinct draft to cover it.
> 
> The SRV text doesn't quite match MX practice; historically, 
> there's been
> *no* default verification of certificate hostname for MX delivery,
> because nobody could agree even on what should be, or could safely be,
> validated.
> 
> The server for spodhuis.org also handles a number of other domains and
> it would be inappropriate to pick one, or to reissue the cert 
> as domains
> come and go.  This is the fundamental issue which led to solution of
> validating the _target_ domain.
Ok, this was exactly me understanding.

> In the text you cite, the "MUST" is for clients that cannot perform
> DNSSEC validation, to attempt to preserve backwards compatibility for
> some fairly common cases where there's a 1:1 mapping between domain at
> hostname (target domain) servicing the domain.
Ok, but what confuses me is that the MUST is for non dnssec validation
clients and for the others it is just a SHOULD.
So at the end it's a bit unclear for me what to put in the certificate. 
Even because I don't know if the cleint uses dnssec validation or not.

> The SMTP draft references only chapter 3 of the SRV draft.
Ok, I think I have to re-read this.

Thanks
 Holger


More information about the dns-operations mailing list