DANE in SMTP—the sky is not falling

Viktor Dukhovni

Wes Hardaker

March 21, 2020

Abstract

This post is a rebuttal to a recent paper: A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email

The paper’s abstract purports “pervasive mismanagement” in the DANE (SMTP) ecosystem. We believe that the paper is often misleading and at times outright wrong.

Misleading primary claims:

Other issues

Study Conclusions

  1. DANE deployment is scarce but increasing

    Correct.

  2. More than one third of all the TLSA records cannot be validated due to missing or incorrect DNSSEC records

    Rather misleading by conflating lack of DS RRs with misconfiguration.

  3. 14% of the certificates are inconsistent with their TLSA records

    The 14% misconfiguration figure is both suspect (inconsistent with our ~3.4% measurement) and fails to take impact into account.

  4. On the SMTP client side, we measured 29 popular email service providers to understand how they support DANE; we found only four of them support DANE for both outgoing and incoming emails, and one email service provider does so only for incoming emails. We also tested four MTA and ten DNS software programs, and found that two of the MTA and seven of the DNS programs support DANE correctly, which implies that the administrators willing to deploy DANE would not find any operational challenges

    The selected providers, MTAs and DNS servers are not necessarily the most appropriate choices.


  1. Unless a resolver happens to be explicitly configured with a trust anchor for that domain.

  2. A better metric would be number of affected recipient mailboxes, but for that one would need to know the number of mailboxes hosted at each domain, which is not something that can be easily measured.

  3. Less secure, as a result of also trusting Let’s Encrypt to never misissue a certificate for their SMTP server, but CA domain-control validation is fairly weak.