JouwWeb enables DANE security for 60,000 mail domains
Only mail servers and the DNS system require configuration
Only mail servers and the DNS system require configuration
Early this year, website platform JouwWeb enabled DANE for all its managed domain names, thus increasing the security of mail transport to and from the domains.
Many JouwWeb customers are non-technical people who expect their service provider to look after everything 'under the hood' of their websites. Waiting until customers start asking for a new technical feature before implementing it therefore implies being too late. Because JouwWeb manages almost all its customers' domain names, DANE implementation was relatively straightforward, insofar as no external changes were required.
DANE is a cryptographic security technology designed to frustrate mail traffic snooping by requiring the use of TLS encryption wherever possible during transport (SMTP). Its effect is to protect the confidentiality of the traffic.
To enable DANE, the DNS protocol has been extended by the addition of a TLSA record. That can be used to link key information — typically a hash code (digital extract) — to an address-protocol-port combination. It is then possible to verify the authenticity of an encrypted internet service's server certificate via the DNS. DNSSEC must be supported for DANE to be enabled.
If the hash code of the server certificate doesn't match the hash code in the TLSA record, the client knows that the connection is not trustworthy, despite the encryption. Nevertheless, the presence of a TLSA record implies that the mail server does support TLS, so an otherwise relatively straightforward downgrade attack on the server's STARTTLS capability is prevented.
JouwWeb caters mainly for the SME sector and currently manages more than 100,000 domains for its customers. "Our proposition is that we take care of all the technical aspects, while customers manage their domain names, web and mail in a graphical environment," says Roel van Duijnhoven, JouwWeb's CTO and founder.
Implementing DANE for the 60,000 mail domains was relatively straightforward. The service provider's mail infrastructure consists of a round-robin load balancer on the MX portals. The Postfix servers (MTAs) behind the balancer process the inbound mail and deliver it to the Dovecot systems that end users access with IMAP. Outbound mail (via the SMTP gateway) is processed by the same Postfix servers. The ultimate mail relay goes via a third party, so that JouwWeb doesn't have to concern itself with IP address reputation management.
In principle, enabling DANE validation for outbound mail on a Postfix server doesn't involve much more than changing a configuration switch (for details, see this article). "The implementation of DANE was part of an upgrade to our mail infrastructure," explains Van Duijnhoven. "Before going live, we tested the new set-up extensively in our staging environment. It has a complete clone of our mail infrastructure, so that we can check that everything works and test performance."
The other side of DANE – the publication of TLSA records to enable external SMTP clients to validate the certificates on your MX portals – involves generating and publishing the associated hashes (as described here). JouwWeb now rolls over the TLS keys on its MX servers once a year, implying that the associated TLSA records have to be rolled over annually as well. However, it's not yet certain whether that policy will be retained, Van Duijnhoven says.
According to Van Duijnhoven, a lot more work went into his company's earlier implementation of DNSSEC – a prerequisite for using DANE, because of the need for a cryptographic chain of trust. "Having put that security in place, we wanted to make good use of it. Adopting DANE is part of that."
One thing that the DANE and DNSSEC implementations – and the earlier HTTPS implementation – have in common, is that they didn't require any customer input. That's in contrast to, for example, SPF implementation, which involves using the DNS to publish the IP addresses of all the servers authorised to send mail for each domain. Because marketing mail and the like is often sent using third-party services, enabling SFP would require customers to always keep their authorised server lists up to date, otherwise their mail could be rejected by SPF-validating MX gateways. JouwWeb does, however, allow customers to enable SPF themselves; they can create their own DNS records via their control panels.
JouwWeb also supports DKIM, another mail security protocol, under which SMTP gateways sign messages before sending them. Although validation cannot be enforced, signing does contribute to the spam score of inbound messages. "E-mail is personal and really matters to customers," Van Duijnhoven stresses. "So we don't want to take any risks with it."
The rollout of DANE to JouwWeb's 60,000 mail domains is discernible in our adoption statistics as a small uptick.
In July 2019, we started incentivising the use of DANE security for inbound mail, through our Registrar Scorecard scheme. Since the financial incentives came in, adoption has risen sharply [1, 2, 3], to nearly 20 per cent of all registered .nl domains. The high level of DNSSEC support in the Netherlands is of course an important enabler in that context.
Another major Dutch hosting market player that bulk-signed its domain names last year is Hostnet. By contrast, KPN dropped DANE (and various other security standards) when incorporating the XS4All infrastructure into its own.