Most active commenters
  • teddyh(11)
  • tptacek(10)
  • ndsipa_pomu(5)
  • 8organicbits(3)
  • vegardx(3)
  • ranger_danger(3)

←back to thread

246 points nh2 | 77 comments | | HN request time: 3.676s | source | bottom
1. ndsipa_pomu ◴[] No.41912342[source]
I prefer to assign an external name to an internal device and grab a free SSL cert from LetsEncrypt, but using DNS challenge instead as internal IP addresses aren't reachable by their servers.
replies(9): >>41912368 #>>41912827 #>>41913126 #>>41913387 #>>41913720 #>>41913826 #>>41916306 #>>41917079 #>>41917804 #
2. DandyDev ◴[] No.41912368[source]
I do this as well, but be aware that these external names you're using for internal devices become a matter of public record this way. If that's okay for you (it is for me), then this is a good solution. The advantage is also that you run no risk of name clashes because you actually own the domain
replies(7): >>41912424 #>>41912505 #>>41912544 #>>41912570 #>>41912671 #>>41912732 #>>41919325 #
3. xfer ◴[] No.41912424[source]
Or use a wildcard cert for all internal certs.
replies(3): >>41912563 #>>41912669 #>>41912935 #
4. magicalhippo ◴[] No.41912505[source]
I decided to try split DNS to avoid leaking the internal IPs, but it turned out a bit more fragile than I imagined.

Especially Android is finicky, ignoring your DNS server if it doesn't like your setup. For example, if it gets an IPv6 address, it requires the DNS server to also have an IPv6 address, or it'll use Google's DNS servers.

It works now but I'm not convinced it's worth it for me.

replies(2): >>41912693 #>>41913504 #
5. ndsipa_pomu ◴[] No.41912544[source]
> be aware that these external names you're using for internal devices become a matter of public record this way

Yes, I sometimes think about that, but have come to the conclusion that it's not likely to make any difference. If someone is trying to infiltrate my home network, then it's not going to really help them to know internal IP addresses as by the time they get to use them, they're already in.

replies(3): >>41912767 #>>41912874 #>>41922694 #
6. ndsipa_pomu ◴[] No.41912563{3}[source]
That could be a good idea, though it means that the certificate/key has to be well guarded.
7. ◴[] No.41912570[source]
8. project2501a ◴[] No.41912669{3}[source]
Please don't. Technical debt accumulates by force of practice.
replies(1): >>41912757 #
9. prmoustache ◴[] No.41912671[source]
you can use a wildcard of type *.internal.example.com or use names that do not relate to the service name if you want to obfuscate the tech stack used.

The only thing public is that you may have an internal network with nodes.

10. Hamuko ◴[] No.41912693{3}[source]
I use CNAME records and it works on everything except Windows, where it works sometimes.

Basically, CNAME record from service.myserver.com to myserver.internal on a public DNS server, A record from myserver.internal to 1.2.3.4 on private DNS server.

I think I could maybe get it working on Windows too by tweaking the TTLs. Currently both DNS servers are automatically setting the TTL and I think Windows freaks out about that.

replies(1): >>41914430 #
11. Eikon ◴[] No.41912732[source]
Shameless plug:

https://www.merklemap.com/

12. qwertox ◴[] No.41912757{4}[source]
It's working good for me. My technical debt is to always make sure that I'm able to renew a certificate and that the distribution occurs successfully.

I don't see how other solutions are less problematic.

13. qwertox ◴[] No.41912767{3}[source]
You don't need to publish the IP addresses publicly if you use an internal DNS server. I think even Pi-hole could do this.
14. djhworld ◴[] No.41912827[source]
I last looked at LetsEncrypt maybe 8-9 years ago, I thought it was awesome but not suitable for my internal stuff due to the http challenge requirement, so I went down the self signed CA route and stuck with that, and didn’t really keep up with developments in the space

It was only until recently someone told me about the DNS challenge and I immediately ported everything over with a wildcard cert - its been great!

replies(1): >>41914886 #
15. dspillett ◴[] No.41912874{3}[source]
> If someone is trying to infiltrate my home network

I don't think the publishing of host names was mentioned as a concern for small home networks, but more for larger organisations that might be subject to a coordinated break-in or simply have trade secrets¹² that might be hinted at by careless naming of resources.

----

[1] Their next big product/enhancement, as yet unannounced even within the company, for instance.

[2] Hmm, checking what is recorded against one of DayJob's domains I see clues as to who some of our clients are. Not really a significant issue for security at all, but I know at least some of our contracts say we shouldn't openly talk about that we provide services to that client³ so I'll drop a message to the ISC to suggest we discuss if we need to care about the matter…

[3] Though that is mostly in the form of not using their logos in our advertising and such.

replies(1): >>41913199 #
16. pridkett ◴[] No.41912935{3}[source]
This is exactly what I do. After seeing how much of my internal network was exposed in certificate transparency logs, I noped out and just do a DNS challenge for a wildcard for almost everything.

Now it’s have a nice script that distributes my key automatically to 20 or so hosts and apps and have a real SSL cert on everything from my UDM Pro to my Synology to random Raspberry Pis running containers. Most of which have domain names that only resolve on my local network.

This is made possible by a fairly robust DNS setup that consists of not only giving A records to all my hosts automatically, but also adding in CNAMEs for services and blocking almost all outbound DNS, DNS over TLS, DoH, etc.

replies(1): >>41914833 #
17. candiddevmike ◴[] No.41913126[source]
Obligatory if DNS validation is good enough, DANE should've been too. Yes, MITM things could potentially ensue on untrusted networks without DNSSEC, but that's perfect being the enemy of good territory IMO.

This would allow folks to have .internal with auto-discovered, decentralized, trusted PKI. It would also enable something like a DNSSEC on/off toggle switch for IoT devices to allow owners to MITM them and provide local functionality for their cloud services.

replies(3): >>41913298 #>>41914996 #>>41916478 #
18. xena ◴[] No.41913199{4}[source]
That's why you have an internal domain that's not related to the company. Something like "packet-flinging.ninja". Everything's a tradeoff though.
replies(1): >>41914129 #
19. ndsipa_pomu ◴[] No.41913298[source]
I hadn't heard of DANE, so looked it up and found the wikipedia entry: https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Na...

According to that, it's not supported by Chrome, nor Firefox.

replies(2): >>41916498 #>>41917893 #
20. Tepix ◴[] No.41913387[source]
How do you automate it?
replies(2): >>41913525 #>>41914481 #
21. capitol_ ◴[] No.41913504{3}[source]
Split DNS causes lots headaches, it also makes it really hard to root cause analysis of failures when they involve DNS.
22. globular-toast ◴[] No.41913525[source]
Not OP but I have a couple of implementations: one using caddyserver[0] as a reverse proxy in a docker-compose set up, and the other is a Kubernetes cluster using cert-manager[1].

[0] https://caddyserver.com/ [1] https://cert-manager.io/

23. lolinder ◴[] No.41913720[source]
Yep. I tried the custom-root-CA approach for a long time, but there were just too many problems with it:

* Loading it into every device was more work than it sounds. We have Android, iOS, Mac, Windows, and Linux, all of which have their own rules.

* Even once loaded, some applications come with their own set of root CAs. Some of those have a custom way of adding a new one (Firefox), others you just had to accept the invalid cert each time, and still others just refused to work.

* I deploy my self-hosted stuff with Docker, which means that not only does each device need to have the root CA added to it but every Docker image that talks to the internal network needs to have it as well. This ends up being a mix of the previous two problems, as I now have to figure out how to mount the CA on an eclectic bunch of distros and I often then have to figure out why the dockerized application isn't using the CA.

In the end I settled on a DNS-challenge wildcard SSL cert loaded into Caddy, with Caddy terminating TLS for everything that's on my home server. It's way simpler to configure the single server (or even 2-3 servers) than every single client.

replies(5): >>41913737 #>>41914971 #>>41915668 #>>41916018 #>>41918994 #
24. from-nibly ◴[] No.41913737[source]
Don't forget chromecast, roku, fire stick, smart TV, and all the other bs.
25. bombcar ◴[] No.41913826[source]
Just get a wildcard cert from letsencyrpt and copy it internally. Then you don’t even need to DNS leak names to LE.
26. deltaburnt ◴[] No.41914129{5}[source]
It seems really easy to associate a company with its internal domain though? Unless the company treats it as a secret only known between machines.
replies(1): >>41917487 #
27. ebb_earl_co ◴[] No.41914430{4}[source]
This seems like a good technique. What DNS software do you use?
replies(1): >>41914479 #
28. Hamuko ◴[] No.41914479{5}[source]
I just use the one built into my UniFi router. Public DNS side is Cloudflare, which allows easy DNS validation for Let's Encrypt.
29. ndsipa_pomu ◴[] No.41914481[source]
I use Dynu.com as my DNS provider (they're cheap, provide APIs and very fast to update which is great for home IP addresses that may change). Then, to get the certificates, I use https://github.com/acmesh-official/acme.sh which is a shell script that supports multiple certificate and DNS providers. Copying the certificates to the relevant machines is done by a custom BASH script that runs the relevant acme.sh commands.

One advantage of DNS challenge is that it can be run anywhere (i.e. doesn't need to run on the webserver) - it just needs the relevant credentials to add a DNS TXT record. I've got my automation wrapped up into a Docker container.

30. dopp0 ◴[] No.41914833{4}[source]
> fairly robust DNS setup that consists of not only giving A records to all my hosts

looks nice, can you give more details on this? tks!

31. bmicraft ◴[] No.41914886[source]
They've introduced the dns challenge almost 9 years ago, you must have barely missed it!
32. poincaredisk ◴[] No.41914971[source]
Historically, before wildcard certificates were suddenly available for free, this leaked all internal domains to the internet, but now it's mostly a solved problem.
replies(3): >>41915477 #>>41918875 #>>41920096 #
33. 8organicbits ◴[] No.41914996[source]
This would be cool, but I think we're still a far way off from that being an option. DANE requires DNSSEC validation by the recursive resolver and a secure connection from the user's device to that resolver. DoH appears to be the leading approach for securing the connection between the user's device and the resolver, and modern browser support is pretty good, but the defaults in use today are not secure:

> It disables DoH when [...] a network tells Firefox not to use secure DNS. [1]

If we enabled DANE right now, then a malicious network could tell the browser to turn off DoH and to use a malicious DNS resolver. The malicious resolver could set the AD flag, so it would look like DNSSEC had been validated. They'd then be able to intercept traffic for all domains with DANE-validated TLS certificates. In contrast, it's difficult for an attacker to fraudulently obtain a TLS certificate from a public CA.

Even if we limit DANE to .internal domains, imagine connecting to a malicious network and loading webmail.internal. A malicious network would have no problem generating a DANE-validated TLS certificate to impersonate that domain.

[1] https://support.mozilla.org/en-US/kb/dns-over-https#w_defaul...

replies(1): >>41915676 #
34. vegardx ◴[] No.41915477{3}[source]
I don't understand why that is such a huge problem. The alternatives have much more severe problems, all from reusing a wildcard in many places to running your own PKI.
replies(1): >>41915630 #
35. NovemberWhiskey ◴[] No.41915630{4}[source]
It depends on your risk profile, but there are definitely people who'd rather run their own PKI than permit threat actor reconnaissance by publishing internal hostnames to CT logs.
replies(1): >>41918151 #
36. tbhb ◴[] No.41915668[source]
These are exactly the challenges and toil I ran into over time with my self-hosted/homelab setup. I use regular domains now as well with DNS challenges for Let's Encrypt. I've been experimenting lately with CloudFlare Tunnel + Zero Trust Access as well for exposing only the endpoints I need from an application for local development like webhooks, with the rest of the site locked behind Access.
replies(1): >>41916455 #
37. candiddevmike ◴[] No.41915676{3}[source]
I'll concede that DNSSEC is not in a good spot these days, but I don't know if that's really due to its design or lack of adoption (it's in similar territory as IPv6 TBH). DoH is (IMO) a poor workaround instead of "fixing" DNSSEC, but it's unfortunately the best way to get secure resolution today.

Putting aside the DNSSEC issues, IMO, DNS should be authoritative for everything. It's perfectly decentralized, and by purchasing a domain you prove ownership of it and shouldn't then need to work within more centralized services like Lets Encrypt/ACME to get a certificate (which seems to becoming more and more required for a web presence). A domain name and a routable IP should be all you need to host services/prove to users that domain.com is yours, and it's something I think we've lost sight of.

Yes, DANE can create security issues, your webmail example is a perfectly valid one. In those situations, you either accept the risk or use a different domain. Not allowing the behavior because of footguns never ends well with technology, and if you're smart enough to use .internal you should understand the risks of doing so.

Basically, we should let adults be adults on the internet and stop creating more centralization in the name of security, IMO.

replies(2): >>41916497 #>>41917214 #
38. gh02t ◴[] No.41916018[source]
> I deploy my self-hosted stuff with Docker, which means that not only does each device need to have the root CA added to it but every Docker image that talks to the internal network needs to have it as well. This ends up being a mix of the previous two problems, as I now have to figure out how to mount the CA on an eclectic bunch of distros and I often then have to figure out why the dockerized application isn't using the CA.

FWIW, I solve this problem with wildcards + a central reverse proxy for containerized apps. I host most services on a subdomain of the machine that hosts containers, like "xxx.container.internal", "xxx2.container.internal", etc. Instead of each container doing it's own SSL I have one central reverse proxy container that binds to 443 and each app container gets put on an internal Docker network with the reverse proxy. Reverse proxy has a wildcard certificate for the host system domain name "*.container.internal" and you can just add an endpoint for each service SNI. I'm using Zoraxy, which makes it very easy to just add a new endpoint if I install a new app with a couple clicks, but this works with lots of other reverse proxies like Caddy, Nginx, etc. If containers need to talk to each other over the external endpoint for some reason and thus need the root CA you can mount the host system's certificate store into the container, which seems to work pretty well the one or two times I needed to do it.

I haven't really solved the annoyance of deploying my root CA to all the devices that need it, which truly is a clusterfuck, but I only have to do it once a year so it isn't that bad. Very open to suggestions if people have good ways to automate this, especially in a general way that can cover Windows/Mac/iOS/Android/various Linuxes uniformly since I have a lot of devices. I've experimented with Ansible, but that doesn't cover mobile devices, which are the ones that make it most difficult.

39. giobox ◴[] No.41916306[source]
LetsEncrypt + DNS challenge + DNS provider with letsencrpyt compatible API for modifying records works fantastically well for getting "real" https/SSL working for private IP addresses, the automatic renewals make it largely set and forget with very little config or setup required.

I've had working validly signed SSL on literally all my private home self-hosted services and load-balancers internally for years this way.

It also easily switches to a production like setup if you later did decide to host something on the public internet.

40. 0x457 ◴[] No.41916455{3}[source]
I used to run wildcard cert with DNS challenge from LE with CloudFlare Tunnel to expose internal server to interwebs.

I have since then switched to ubiquiti products, and now I just run wireguard server for my road-warrior devices. Would use CloudFlare Tunnel if I ever need to expose anything publically.

41. tptacek ◴[] No.41916478[source]
DANE rollout was attempted. It didn't work reliably (middleboxes freak out about DNSSEC), slowed things down when it did, and didn't accomplish any security goals (even on its own terms) because it can't plausibly be deployed DANE-only on the modern Internet. Even when the DANE working group came up with a no-additional-RTTs model for it (stapling), it fell apart for security reasons (stripping). DANE is a dead letter.

It happens. I liked HPKP, which was also tried, and also failed.

42. tptacek ◴[] No.41916497{4}[source]
It is not in similar territory as IPv6. We live in a mixed IPv4/IPv6 world (with translation). IPv6 usage is steadily and markedly increasing. Without asking to be, I'm IPv6 (on ATT Fiber) right now. DNSSEC usage has actually declined in North America in the preceding 18 months, and its adoption is microscopic to begin with.

IPv6 is going to happen (albeit over a longer time horizon than its advocates hoped). DNSSEC has failed.

replies(1): >>41917884 #
43. tptacek ◴[] No.41916498{3}[source]
It was, once, and then got pulled.
44. thatcherc ◴[] No.41917079[source]
This sounds like something I'd want to do! Is the idea that you'd have a public domain name like "internal.thatcherc.com" resolve to an internal IP address like 10.0.10.5? I've wondered about setting this up for some local services I have but I wasn't sure if it was a commonly-done thing.
replies(1): >>41917173 #
45. AdamJacobMuller ◴[] No.41917173[source]
I've been doing this for a year or two with k3s + cert-manager.

Works great.

In my case everything points to a tailscale operator endpoint, which goes to nginx ingress, which routes to the appropriate pods.

It's very much a set-and-forget solution.

46. 8organicbits ◴[] No.41917214{4}[source]
DANE without DNSSEC isn't a good idea. DoH secures the connection between the user's device and their recursive resolver, but it cannot secure the connection between the recursive resolver and the authoritative name servers. If you're using DANE you need a stronger guarantee that the records are valid.
47. dspillett ◴[] No.41917487{6}[source]
> It seems really easy to associate a company with its internal domain though?

Especially as people will talk about it as a “you'll never guess what…” when talking about places they work or have worked.

48. wkat4242 ◴[] No.41917804[source]
Yeah that's what I do. If you use anything other than Cloudflare its really really hard to get the authentication plugins going on every different web server though. Every server supports a different subset of providers and usually you have to install the plugins separately. It's a bit of a nightmare. But once it's dialled in it's ok.

I didn't like this approach because I don't like to leak information about my internal setup but I found that you don't even have to register your servers on a public DNS so it's ok. Just the domain has to exist. It does create very temporary TXT records though.

49. teddyh ◴[] No.41917884{5}[source]
> DNSSEC has failed.

This is the customary comment by me that this is far from the prevailing view. From my viewpoint, DNSSEC is steadily increasing, both in demand and in amount of domains signed.

replies(1): >>41918623 #
50. teddyh ◴[] No.41917893{3}[source]
It’s customarily used for e-mail transport.
replies(1): >>41921257 #
51. vegardx ◴[] No.41918151{5}[source]
When this information is useful you've either got fundamental security related issues that needs to be addressed long before this, or you're dealing with threat actors with significant capabilities. In the latter case you've probably already taking this into account when you're creating your stuff, or you have the capability and technical understanding to know how to properly roll out your own PKI.

The overlap of people that suggest that you either run your own PKI or just distribute a wildcard certificate and have the technical understanding on how to do this in a secure way is minuscule. The rest of those people are probably better off using something like Lets Encrypt.

replies(1): >>41920091 #
52. tptacek ◴[] No.41918623{6}[source]
Here's .COM and .NET:

https://www.verisign.com/en_US/company-information/verisign-...

Signed domains are increasing where they're done automatically by registrars; where the market has a say, use is declining --- sharply!

replies(1): >>41926486 #
53. peanut-walrus ◴[] No.41918875{3}[source]
So what? Do you keep secrets in your domain names?
54. DidYaWipe ◴[] No.41918994[source]
I've used this method for development successfully (generating CAs and certs on Mac with mkcert), but Apple has broken certificates in iOS 18. Root CAs are not showing up in the trust UI on iPhones after you install them. It's a big issue for developers, and has broken some people's E-mail setups as well. Also some internal software deployments.

Apple is aware of it, but it's still not fixed in iOS 18.1.

55. js2 ◴[] No.41919325[source]
Using a wildcard cert doesn't leak anything much. I went with `*.home.example.com` for my internal stuff.
56. ranger_danger ◴[] No.41920091{6}[source]
I still think it's a good idea not to expose more information than necessary, mostly for the reasons we can't think of.

Also I wouldn't be surprised if Let's Encrypt/ZeroSSL were compromised.

replies(1): >>41922276 #
57. ranger_danger ◴[] No.41920096{3}[source]
> suddenly available for free

I have to wonder if there is some hidden ulterior motive behind that.

replies(1): >>41920267 #
58. 8organicbits ◴[] No.41920267{4}[source]
Let's Encrypt is a well funded non-profit project. What ulterior motive do you imagine?

https://letsencrypt.org/sponsors/

replies(1): >>41921472 #
59. tptacek ◴[] No.41921257{4}[source]
No, it isn't; it can't be, because none of the major email domains are DNSSEC-signed to begin with.

Let me know if I've misunderstood your point, and there some other widespread niche usage DANE finds in SMTP.

replies(1): >>41926451 #
60. ranger_danger ◴[] No.41921472{5}[source]
I think the obvious is a world government that wants to spy on everyone.
61. vegardx ◴[] No.41922276{7}[source]
It would surprise me if it was, because of features like certificate transparency logs.
62. GoblinSlayer ◴[] No.41922694{3}[source]
If your services work through http(s), they can be accessed from your browser.
63. teddyh ◴[] No.41926451{5}[source]
“Customarily” must not necessarily mean “major email domains”. As I understand it, DANE is commonly used by organizations wanting to secure e-mail between them; DANE enforcement is agreed by both parties, and then used without issue.
replies(1): >>41930841 #
64. teddyh ◴[] No.41926486{7}[source]
As I usually have to point out to you, registrars can’t add DNSSEC to domains. Only DNS server operators can do that. They often have to have the cooperation of the registrar to do it, but not always; sometimes, if the registry supports CDS/CDNSKEY records, the DNS server operator can add DNSSEC all by themselves. And why would DNS server operators add DNSSEC to their domains, unless the domain owners wanted them to?
replies(1): >>41927638 #
65. tptacek ◴[] No.41927638{8}[source]
I'm really not interested in whatever technicality you're trying to argue here. I'm talking about whatever words you want to use for this phenomenon:

https://www.sidn.nl/en/modern-internet-standards/dnssec

Meanwhile: the graphs I posted in the preceding comment are pretty striking. If you haven't clicked through yet, you should. I've pointed out previous, minor drops in DNSSEC deployment in the US. The current one is not minor.

replies(1): >>41954657 #
66. wolf550e ◴[] No.41930841{6}[source]
Didn't they invent MTA-STS so they could not use DANE? They use MTA-STS.
replies(1): >>41954625 #
67. teddyh ◴[] No.41954625{7}[source]
I know that is what MTA-STS is for, but haven’t heard from people actually using it. I have, however, heard from people using DANE in the way i described.

(For those who don’t know, MTA-STS is basically DANE but for people who hate DNSSEC. And are OK with requiring every mail server to also have a web server running.)

replies(2): >>41956791 #>>42077147 #
68. teddyh ◴[] No.41954657{9}[source]
If you can’t get the technical details right, maybe you should hold your piece; this is a technical discussion. I also think you posted the wrong link.

> The current one is not minor.

Maybe not, but I do not know the cause, and you have not proposed one either. Do you have a theory about what happened in late 2023? We’ll have to see if this trend continues; the graphs you linked do show a slight upward turn right at the end of the graphs.

69. tptacek ◴[] No.41956791{8}[source]
Respectfully, what are you talking about? The four largest email providers in the world all run STS. You can test for yourself: just do `dig +short txt _mta_sts.DOMAIN`. I stopped looking after I saw that even Yahoo Mail does it.
replies(1): >>41961090 #
70. teddyh ◴[] No.41961090{9}[source]
I’m talking about hearing from actual people running their own e-mail infrastructure, or who are at least working closely with some local party to run it for them. What the humongous e-mail providers do is largely irrelevant for the purposes of what people in general should do with their own systems; what large providers do is rarely in the interests of anyone else but themselves.

(Also, your test is wrong. It should be “_mta-sts”, not “_mta_sts”.)

replies(1): >>41963941 #
71. tptacek ◴[] No.41963941{10}[source]
What an odd definition of "using it". It only counts if just a couple random people set it up, but not if hundreds of millions of people rely on it.
replies(1): >>41987695 #
72. teddyh ◴[] No.41987695{11}[source]
You frequently argue that DNSSEC usage only counts when it’s added to domains by the domain owners, not when it is added by DNS server operators (who are frequently also the registrars). Why then should MTA-STS usage count if it’s done by the few huge centralized e-mail providers?

When it’s purposefully set up by actual people, I only hear about DANE. It’s only when talking about huge e-mail providers that I hear about MTA-STS. And, as I said previously, those huge providers probably chose MTA-STS not for any reason which benefits their regular users, but for reasons which benefits only themselves, being a huge operator.

replies(1): >>41991701 #
73. tptacek ◴[] No.41991701{12}[source]
No! These aren't comparable problems. MTA-STS is designed to defeat SSL-stripping. It works whether specific users know about it or not. That is not the case for DNSSEC. This is why MTA-STS is overwhelmingly deployed across email users, and DNSSEC has less than 5% deployment (and falling). Thanks for the opportunity to clarify.

If you're wondering why DNSSEC never took off, these kinds of exchanges are illustrative!

replies(1): >>42004941 #
74. teddyh ◴[] No.42004941{13}[source]
> It works whether specific users know about it or not. That is not the case for DNSSEC.

I am baffled by this claim. DNSSEC works completely transparently to the user.

Also, we were comparing the specifics of MTA-STS to DANE, not to DNSSEC. Both MTA-STS and DANE solves the same problem, i.e. fake X.509 certificates and/or protocol degradation (SSL stripping). DANE has the potential to solve the same problem for every protocol, not just SMTP, while MTA-STS is both specific to e-mail, and stupidly requires an additional web server on every SMTP server.

> and falling

It’s actually rising again, according to your sources.

In recent years, you seem to have dropped all pretense of arguing against the specifics of DNSSEC, which is good, but you have then resorted to argumentum ad populum. However, this is a bad form of argumentation unless you can explain why DNSSEC is not as popular as it could be. For instance, what happened in late 2023 to cause the dip?

replies(1): >>42008100 #
75. tptacek ◴[] No.42008100{14}[source]
The chart is right there upthread for anybody interested to see. No, I haven't dropped any of my arguments against DNSSEC.
replies(1): >>42097392 #
76. teddyh ◴[] No.42077147{8}[source]
(This use of DANE is explicitly described in RFC 7672, section 6.)
77. teddyh ◴[] No.42097392{15}[source]
Yes, anyone can see the trend has now turned upwards again. Including you, if you would look.