DANE Explained

E-mail tied to DNSSEC for better privacy and security, and to avoid spoofing

DANE email security diagram

DANE and its relationship to DNSSEC #

DANE (DNS-Based Authentication of Named Entities) uses DNSSEC to authenticate TLS certificates using TLSA records.

Using DANE with Postfix for Secure Email Delivery #

Postfix supports DANE (DNS-Based Authentication of Named Entities) to authenticate SMTP servers using DNSSEC-validated TLSA records. This allows mail servers to verify TLS certificates using DNSSEC instead of relying exclusively on traditional Certificate Authorities.

When DANE is enabled, Postfix will automatically check DNS for TLSA records associated with the destination mail server and validate them using DNSSEC. If the DNSSEC chain of trust is valid, the SMTP connection can be authenticated cryptographically.

Example: enabling DANE in Postfix


# /etc/postfix/main.cf

smtp_tls_security_level = dane
smtp_dns_support_level = dnssec
smtp_tls_loglevel = 1
smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt
smtp_tls_protocols = !SSLv2, !SSLv3
smtp_tls_mandatory_protocols = !SSLv2, !SSLv3
smtp_tls_mandatory_ciphers = high
smtp_tls_ciphers = high

What this configuration does

Example TLSA record for SMTP

A mail server supporting DANE publishes a TLSA record similar to the following:


_25._tcp.mail.example.com. IN TLSA 3 1 1 2A3F1D6E8E2F...

Checking TLSA records


dig +dnssec _25._tcp.mail.example.com TLSA

If DNSSEC validation succeeds, a DANE-enabled SMTP server can use this information to authenticate the remote mail server before delivering email.

Related DNS Topics

Request Information

captcha
Can't read it? Click refresh
Planisys 2025 © All rights reserved.