Skip to content

Nuface Blog

้šจๆ„้šจๆ‰‹่จ˜ Casual Notes

Menu
  • Home
  • About
  • Services
  • Blog
  • Contact
  • Privacy Policy
  • Login
Menu

DANE: DNSSEC-Based TLS Protection

Posted on 2025-12-032025-12-03 by Rico

๐Ÿ“Œ Introduction

As mentioned in the MTA-STS article, SMTP over TLS is vulnerable to downgrade and MITM attacks. MTA-STS improves security but still relies on HTTPS, CA certificates, and DNS TXT records, which may be intercepted or manipulated.

For environments requiring even stronger, cryptographically verifiable security, there is DANE (DNS-based Authentication of Named Entities).

DANE uses DNSSEC to authenticate TLS certificates directly from DNS records.

๐Ÿ‘‰ It binds your TLS certificate to DNS
๐Ÿ‘‰ It is cryptographically protected by DNSSEC
๐Ÿ‘‰ MITM and certificate replacement become impossible


๐Ÿ” What Is DANE?

DANE is a protocol that uses DNSSEC-signed TLSA records to authenticate TLS certificates.

It ensures:

  1. MX records cannot be spoofed
  2. TLS certificates cannot be replaced
  3. Attackers cannot downgrade encryption
  4. Only certificates matching the TLSA record are accepted

Unlike MTA-STS, DANE does not rely on certificate authorities.
You can even use a self-signed certificate if it matches the TLSA record.


๐Ÿงฉ Requirements for DANE

1๏ธโƒฃ DNSSEC must be enabled

Absolutely mandatory.

2๏ธโƒฃ The MX hostname must also use DNSSEC

Example:

example.com       MX 10 mail.example.com
mail.example.com  A 192.168.1.10

Both labels must be DNSSEC-signed.

3๏ธโƒฃ TLSA records must be published

Example:

_25._tcp.mail.example.com. TLSA 3 1 1 1A2B3C4D...

๐Ÿ”„ How DANE Works (SMTP Example)

  1. Sender validates MX via DNSSEC
  2. Sender fetches TLSA via DNSSEC
  3. TLS handshake begins
  4. TLS certificate is compared to TLSA
  5. If mismatch โ†’ reject
  6. If match โ†’ accept and deliver

DANE is strict: if TLSA exists, it must validate.


๐Ÿ†š MTA-STS vs DANE Comparison

FeatureMTA-STSDANE
Requires DNSSECNoYes
Policy sourceHTTPSDNSSEC-signed TLSA
MITM protectionHighVery high
Certificate requirementsPublic CA onlySelf-signed OK
Deployment difficultyLowHigh
Supported by Google/MicrosoftYesNo

Conclusion:

  • DANE = Highest security
  • MTA-STS = Most widely supported

Combined together:
๐Ÿ‘‰ DANE (if available) + MTA-STS (fallback) = Best practice


๐Ÿ”ง TLSA Record Example

_25._tcp.mail.example.com. IN TLSA 3 1 1 (
  9A1CF293716A5C31A021341F89A91B77F17C93A2F4F6F7C6A2F9D4024B6EAE1D
)

Description:

  • 3 โ†’ DANE-EE (End-Entity certificate)
  • 1 โ†’ Cert (entire certificate)
  • 1 โ†’ SHA-256
  • Last line โ†’ Fingerprint

๐Ÿข Who Supports DANE?

MTASupport
Postfixโœ” Yes
Eximโœ” Yes
OpenSMTPDโœ” Yes
GmailโŒ No
Microsoft 365โŒ No

DANE is widely used by EU governments, financial institutions, and high-security environments.


๐ŸŽฏ Conclusion

DANE provides the strongest email transport security available today by combining:

  • DNSSEC integrity
  • TLS certificate pinning
  • Full MITM protection

Although deployment requires DNSSEC and additional operational effort, it provides unmatched protection.

If your organization manages its own Postfix/Dovecot infrastructure and can deploy DNSSEC, DANE combined with MTA-STS delivers the highest security posture for email transport.

Recent Posts

  • Postfix + Letโ€™s Encrypt + BIND9 + DANE Fully Automated TLSA Update Guide
  • Postfix + Letโ€™s Encrypt + BIND9 + DANE TLSA ๆŒ‡็ด‹่‡ชๅ‹•ๆ›ดๆ–ฐๅฎŒๆ•ดๆ•™ๅญธ
  • Deploying DANE in Postfix
  • ๅฆ‚ไฝ•ๅœจ Postfix ไธญ้ƒจ็ฝฒ DANE
  • DANE: DNSSEC-Based TLS Protection

Recent Comments

  1. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on High Availability Architecture, Failover, GeoDNS, Monitoring, and Email Abuse Automation (SOAR)
  2. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on MariaDB + PostfixAdmin: The Core of Virtual Domain & Mailbox Management
  3. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on Daily Operations, Monitoring, and Performance Tuning for an Enterprise Mail System
  4. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on Final Chapter: Complete Troubleshooting Guide & Frequently Asked Questions (FAQ)
  5. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on Network Architecture, DNS Configuration, TLS Design, and Postfix/Dovecot SNI Explained

Archives

  • December 2025
  • November 2025
  • October 2025

Categories

  • AI
  • Apache
  • Cybersecurity
  • Database
  • DNS
  • Docker
  • Fail2Ban
  • FileSystem
  • Firewall
  • Linux
  • LLM
  • Mail
  • N8N
  • OpenLdap
  • OPNsense
  • PHP
  • QoS
  • Samba
  • Switch
  • Virtualization
  • VPN
  • WordPress
© 2025 Nuface Blog | Powered by Superbs Personal Blog theme