Pilot phase for DNSSEC/DANE for DFN with dfnsec.de in August 2020
Dear DANE users,
I like to inform you, after several years of waiting, the Deutsche Forschungsnetz will finally offer a solution for using their mail support with DNSSEC/DANE [1]. For whatever reason, they do not want to fiddle/test with dfn.de, and, therefore, are going to introduce the new domain dfnsec.de first.
The pilot phase is going to be from August 3rd to 31st, and they are introducing faulty entries on Tuesday and Thursday from 10:00 to 14:00.
Kind regards,
Paul
[1]: https://www.mailsupport.dfn.de/dokumentation/komponenten/dns/dnssec/pilotpha...
On Jul 1, 2020, at 4:01 AM, Paul Menzel pmenzel+dane-users@molgen.mpg.de wrote:
I like to inform you, after several years of waiting, the Deutsche Forschungsnetz will finally offer a solution for using their mail support with DNSSEC/DANE [1]. For whatever reason, they do not want to fiddle/test with dfn.de, and, therefore, are going to introduce the new domain dfnsec.de first.
The pilot phase is going to be from August 3rd to 31st, and they are introducing faulty entries on Tuesday and Thursday from 10:00 to 14:00.
I take this to mean that dfn.de is planning to have DNSSEC signed MX hosts with TLSA RRs under a new dfnsec.de domain. That's good news, thanks! In terms of candidate DNSSEC-signed domains currently using dfn.de MX hosts, that could/should consider switching to dfnsec.de, I currently find the following 33 in the DNSSEC/DANE survey dataset:
ainin.de beperfekt.de carissma.eu cmbb-fcmh.de fachhochschule-neu-ulm.de fh-ingolstadt.de haw-ingolstadt.de hnu.de hs-ab.de ifw-dresden.de ifw-dresden.eu inp-greifswald.de ipk-gatersleben.de khu-hessen.de ku.de litdok.de magnetoresistance.de magnetwiderstand.de mdc-berlin.de mpg.de mythi.de pidconsortium.net profit-hpc.de project-day.de qcnp.org robdream.eu spinlogik.de superconductivity.de thi.de th-owl.de tu.berlin ugoe.de unigottingen.de
It would be nice to see some of these join the pilot.
Dear Viktor,
Am 01.07.20 um 08:27 schrieb Viktor Dukhovni:
On Jul 1, 2020, at 4:01 AM, Paul Menzel wrote:
I like to inform you, after several years of waiting, the Deutsche Forschungsnetz will finally offer a solution for using their mail support with DNSSEC/DANE [1]. For whatever reason, they do not want to fiddle/test with dfn.de, and, therefore, are going to introduce the new domain dfnsec.de first.
The pilot phase is going to be from August 3rd to 31st, and they are introducing faulty entries on Tuesday and Thursday from 10:00 to 14:00.
I take this to mean that dfn.de is planning to have DNSSEC signed MX hosts with TLSA RRs under a new dfnsec.de domain. That's good news, thanks!
Yes, it is meant as opt-in.
In terms of candidate DNSSEC-signed domains currently using dfn.de MX hosts, that could/should consider switching to dfnsec.de, I currently find the following 33 in the DNSSEC/DANE survey dataset:
[…]
A lot of the subdomains of mpg.de use the DFN-MailSupport separately, and from those, to my knowledge, only us – molgen.mpg.de – have set up DNSSEC. (The other few DNSSEC users do *not* use the DFN-MailSupport – for example mpifr-bonn.mpg.de.)
It would be nice to see some of these join the pilot.
Yes, we will see. At least after the pilot phase, hopefully, the current DNSSEC users will set up DANE.
Kind regards,
Paul
Dear DANE users,
Am 01.07.20 um 13:16 schrieb Paul Menzel:
Am 01.07.20 um 08:27 schrieb Viktor Dukhovni:
On Jul 1, 2020, at 4:01 AM, Paul Menzel wrote:
I like to inform you, after several years of waiting, the Deutsche Forschungsnetz will finally offer a solution for using their mail support with DNSSEC/DANE [1]. For whatever reason, they do not want to fiddle/test with dfn.de, and, therefore, are going to introduce the new domain dfnsec.de first.
The pilot phase is going to be from August 3rd to 31st, and they are introducing faulty entries on Tuesday and Thursday from 10:00 to 14:00.
I take this to mean that dfn.de is planning to have DNSSEC signed MX hosts with TLSA RRs under a new dfnsec.de domain. That's good news, thanks!
Yes, it is meant as opt-in.
Good news. The pilot was successful, and after over four years, the DFN finally delivered.
Luckily, it looks like they were able to remove the internal doubts, and set up DNSSEC for dfn.de directory now and published the TLSA resource records [2].
In terms of candidate DNSSEC-signed domains currently using dfn.de MX hosts, that could/should consider switching to dfnsec.de, I currently find the following 33 in the DNSSEC/DANE survey dataset:
[…]
All the 33 domains are supported DANE now automatically. Yeah!
A lot of the subdomains of mpg.de use the DFN-MailSupport separately, and from those, to my knowledge, only us – molgen.mpg.de – have set up DNSSEC. (The other few DNSSEC users do *not* use the DFN-MailSupport – for example mpifr-bonn.mpg.de.)
As written, unfortunately, not all subdomains of mpg.de have DNSSEC set up.
My institute molgen.mpg.de and cpfs.mpg.de from Dresden do use DNSSEC, and therefore have DANE working now.
[…]
Kind regards,
Paul
[2]: https://www.mailsupport.dfn.de/news/aktivierung-der-tlsa-records
PS: Example:
$ /usr/sbin/posttls-finger -t30 -T180 -c -L verbose,summary -l dane-only -P /etc/ssl/certs/ molgen.mpg.de posttls-finger: initializing the client-side TLS engine posttls-finger: using DANE RR: _25._tcp.a1241.mx.srv.dfn.de IN TLSA 3 0 1 27:0E:C9:DD:08:18:AB:C8:1C:96:68:3F:11:16:D8:A5:EA:66:66:D3:64:29:FD:5D:83:D6:11:F6:87:26:C9:3A posttls-finger: setting up TLS connection to a1241.mx.srv.dfn.de[194.95.232.62]:25 posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@strength:!aNULL" posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: depth=3 verify=1 subject=/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2 posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: depth=2 verify=1 subject=/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Certification Authority 2 posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: depth=1 verify=1 subject=/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Global Issuing CA posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: depth=0 verify=1 subject=/C=DE/ST=Berlin/L=Berlin/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=Geschaeftsstelle/CN=*.mx.srv.dfn.de posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: depth=0 matched end entity certificate sha256 digest 27:0E:C9:DD:08:18:AB:C8:1C:96:68:3F:11:16:D8:A5:EA:66:66:D3:64:29:FD:5D:83:D6:11:F6:87:26:C9:3A posttls-finger: a1241.mx.srv.dfn.de[194.95.232.62]:25: subject_CN=*.mx.srv.dfn.de, issuer_CN=DFN-Verein Global Issuing CA, fingerprint=25:2C:32:73:0D:01:13:53:F5:59:1D:1E:CA:E4:DA:8B:E0:94:75:56, pkey_fingerprint=D5:6E:6C:41:CC:28:0F:66:71:8C:76:D1:F1:5B:F9:7C:EB:13:8A:AB posttls-finger: Verified TLS connection established to a1241.mx.srv.dfn.de[194.95.232.62]:25: TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256 $ /usr/sbin/posttls-finger -t30 -T180 -c -L verbose,summary -l dane-only -P /etc/ssl/certs/ vw.molgen.mpg.de posttls-finger: initializing the client-side TLS engine posttls-finger: using DANE RR: _25._tcp.b1234.mx.srv.dfn.de IN TLSA 3 0 1 27:0E:C9:DD:08:18:AB:C8:1C:96:68:3F:11:16:D8:A5:EA:66:66:D3:64:29:FD:5D:83:D6:11:F6:87:26:C9:3A posttls-finger: setting up TLS connection to b1234.mx.srv.dfn.de[194.95.234.102]:25 posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@strength:!aNULL" posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: depth=3 verify=1 subject=/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2 posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: depth=2 verify=1 subject=/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Certification Authority 2 posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: depth=1 verify=1 subject=/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Global Issuing CA posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: depth=0 verify=1 subject=/C=DE/ST=Berlin/L=Berlin/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=Geschaeftsstelle/CN=*.mx.srv.dfn.de posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: depth=0 matched end entity certificate sha256 digest 27:0E:C9:DD:08:18:AB:C8:1C:96:68:3F:11:16:D8:A5:EA:66:66:D3:64:29:FD:5D:83:D6:11:F6:87:26:C9:3A posttls-finger: b1234.mx.srv.dfn.de[194.95.234.102]:25: subject_CN=*.mx.srv.dfn.de, issuer_CN=DFN-Verein Global Issuing CA, fingerprint=25:2C:32:73:0D:01:13:53:F5:59:1D:1E:CA:E4:DA:8B:E0:94:75:56, pkey_fingerprint=D5:6E:6C:41:CC:28:0F:66:71:8C:76:D1:F1:5B:F9:7C:EB:13:8A:AB posttls-finger: Verified TLS connection established to b1234.mx.srv.dfn.de[194.95.234.102]:25: TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA2560<Up>
participants (2)
-
Paul Menzel
-
Viktor Dukhovni