Support of DANE and DNSSEC in Office 365 Exchange Online

Published Apr 06 2020 07:00 AM 51.4K Views

Microsoft is committed to providing world-class email security solutions and the support for the latest Internet standards in order to provide advanced email protection for our customers. Today we are announcing that Exchange Online will be adding support for two new Internet standards specific to SMTP traffic.

These standards are DNSSEC (Domain Name System Security Extensions) and DANE for SMTP (DNS-based Authentication of Named Entities).  

Some History

The SMTP protocol was designed a long time ago, when message delivery was considered more important than security. Over time, as security and privacy became increasingly more important, several new standards emerged and one of those is RFC 3207: “SMTP Service Extension for Secure SMTP over Transport Layer Security (TLS)”. This is often referred to as Opportunistic TLS, or STARTTLS. Opportunistic TLS provides encryption for SMTP connections and even though it’s a great improvement over plain SMTP, it still has a significant number of vulnerabilities.

One such vulnerability is the downgrade attack, which is a form of man-in-the-middle-attack (MITM). This happens when an attacker is able to strip the STARTTLS verb from the target SMTP gateway during the initial in-the-clear communication, often resulting in the sending SMTP server simply deciding to continue sending the message in clear text rather than stopping transmission.

Another limitation that exists with Opportunistic TLS is the inability for the sending server to authenticate the identity of the receiving SMTP gateway. An attacker can spoof the receiving SMTP gateway’s DNS record and present an alternate MX record for a server that they own. Even if the connection is encrypted, the sending server will never know that email was diverted to the malicious server.   

Our Future

Microsoft has been working closely with partners through the industry association M3AAWG  to solve such limitations throughout the email ecosystem. As a result, we have decided to build and add support for DNSSEC and DANE for SMTP to Exchange Online. This support will be specific to SMTP traffic between SMTP gateways. We will also be providing support for TLS reporting (TLS-RPT).  

  • DANE for SMTP provides a more secure method for email transport. DANE uses the presence of DNS TLSA resource records to securely signal TLS support to ensure sending servers can successfully authenticate legitimate receiving email servers. This makes the secure connection resistant to downgrade and MITM attacks.
  • DNSSEC works by digitally signing records for DNS lookup using public key cryptography. This ensures that the received DNS records have not been tampered with and are authentic. 
  • TLS-RPT enables diagnostic reporting to support monitoring and troubleshooting of TLS connectivity issues. 

The support of the above standards, especially DNSSEC, will require investment and architecture changes to the Microsoft infrastructure - an investment we believe is necessary to enhance protection for our customers. As this will require significant work, we will be releasing DANE and DNSSEC for SMTP in two phases.

The first phase will include only outbound support (mail sent outbound from Exchange Online) and we aim to enable this by the end of the calendar year 2020. The second phase will add inbound support for Exchange Online and we plan to enable that by the end of 2021. For both of those phases, corresponding TLS-RPT support will be provided.   

While we integrate these changes, we want to ensure our customers know that there are third party solutions available for Exchange Online. Customers have the option to run their own SMTP gateways supporting DNSSEC and DANE for SMTP and they can create Outbound and Inbound connectors to route the email messages to and from Exchange Online. 

We are happy to announce support for DNSSEC and DANE for SMTP to strengthen Office 365 Exchange Online email security and provide advanced protection to our customers 

The Exchange Transport Team

21 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-1275494%22%20slang%3D%22en-US%22%3ESupport%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1275494%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EMicrosoft%26nbsp%3Bis%20committed%26nbsp%3Bto%20providing%20world-class%26nbsp%3Bemail%26nbsp%3Bsecurity%20solutions%26nbsp%3Band%20the%20support%20for%26nbsp%3Bthe%20latest%26nbsp%3BInternet%26nbsp%3Bstandards%20in%20order%20to%20provide%20advanced%20email%20protection%20for%20our%20customers%3C%2FSPAN%3E%3CSPAN%3E.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3BToday%20we%20are%26nbsp%3Bannouncing%20that%20Exchange%20Online%20will%20be%20adding%20support%20for%20two%20new%20Internet%20standards%20specific%20to%20SMTP%20traffic.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThese%20standards%20are%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc4033%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDNSSEC%3C%2FA%3E%3CSPAN%3E%20(Domain%20Name%20System%20Security%20Extensions)%20and%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc7672%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDANE%3C%2FA%3E%3CSPAN%3E%20for%20SMTP%3C%2FSPAN%3E%3CSPAN%3E%20(DNS-based%20Authentication%20of%20Named%20Entities).%20%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3ESome%20History%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20SMTP%20protocol%20was%20designed%20a%20long%20time%20ago%2C%20when%20message%20delivery%20was%20considered%20more%20important%20than%20security.%20Over%20time%2C%20as%20security%20and%20privacy%20became%20increasingly%20more%20important%2C%20several%20new%20standards%20emerged%20and%20one%20of%20those%20is%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc3207%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ERFC%203207%3C%2FA%3E%3CSPAN%3E%3A%20%E2%80%9CSMTP%20Service%20Extension%20for%20Secure%20SMTP%20over%20Transport%20Layer%20Security%20(TLS)%E2%80%9D.%20This%20is%20often%20referred%20to%20as%20Opportunistic%20TLS%2C%20or%20STARTTLS.%20Opportunistic%20TLS%20provides%20encryption%20for%20SMTP%20connections%20and%20even%20though%20it%E2%80%99s%20a%20great%20improvement%20over%20plain%20SMTP%2C%20it%20still%20has%20a%20significant%20number%20of%20vulnerabilities.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EOne%20such%20vulnerability%20is%20the%20downgrade%20attack%2C%20which%20is%20a%20form%20of%20%3CSPAN%3Eman-in-the-middle-attack%20(MITM).%20This%20happens%20when%20an%20attacker%20is%20able%20to%20strip%20the%20STARTTLS%20verb%20from%20the%20target%20SMTP%20gateway%20during%20the%20initial%20in-the-clear%20communication%2C%20often%20resulting%20in%20the%20sending%20SMTP%20server%20simply%20deciding%20to%20continue%20sending%20the%20message%20in%20clear%20text%20rather%20than%20stopping%20transmission.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAnother%20limitation%20that%20exists%20with%20Opportunistic%20TLS%20is%20the%20inability%20for%20the%20sending%20server%20to%20authenticate%20the%20identity%20of%20the%20receiving%20SMTP%20gateway.%20An%20attacker%20can%20spoof%20the%20receiving%20SMTP%20gateway%E2%80%99s%20DNS%20record%20and%20present%20an%20alternate%20MX%20record%20for%20a%20server%20that%20they%20own.%20Even%20if%20the%20connection%20is%20encrypted%2C%20the%20sending%20server%20will%20never%20know%20that%20email%20was%20diverted%20to%20the%20malicious%20server.%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EOur%20Future%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%26nbsp%3Bhas%20been%26nbsp%3Bworking%20closely%20with%20partners%20through%20the%20industry%20association%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.m3aawg.org%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EM%3CSUP%3E3%3C%2FSUP%3EAAWG%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%20to%20solve%20such%20limitations%20throughout%26nbsp%3Bthe%26nbsp%3Bemail%20ecosystem.%20As%20a%20result%2C%20we%20have%20decided%20to%20build%20and%26nbsp%3Badd%26nbsp%3Bsupport%26nbsp%3Bfor%26nbsp%3BDNSSEC%20and%26nbsp%3BDANE%26nbsp%3Bfor%20SMTP%20to%20Exchange%20Online.%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3EThis%20support%20will%20be%20specific%20to%20SMTP%20traffic%20between%20SMTP%20gateways.%26nbsp%3BWe%20will%20also%20be%20providing%20support%20for%26nbsp%3BTLS%26nbsp%3Breporting%20(TLS-RPT).%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSPAN%3E%3CSTRONG%3EDANE%20for%20SMTP%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%20provides%20a%20more%20secure%20method%20for%20email%20transport.%20DANE%26nbsp%3Buses%20the%20presence%20of%20DNS%20TLSA%20resource%20records%20to%20securely%20signal%20TLS%20support%20to%20ensure%20sending%20servers%20can%20successfully%20authenticate%20legitimate%20receiving%20email%20servers.%20This%20makes%20the%20secure%20connection%20resistant%20to%20downgrade%20and%20MITM%20attacks.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CSTRONG%3EDNSSEC%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3Eworks%20by%20digitally%20signing%20records%20for%20DNS%20lookup%20using%20public%20key%20cryptography.%20This%20ensures%20that%20the%20received%20DNS%20records%20have%20not%20been%20tampered%20with%20and%20are%20authentic.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3E%3CSTRONG%3ETLS-RPT%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3Benables%20diagnostic%20reporting%20to%20support%20monitoring%20and%20troubleshooting%20of%20TLS%20connectivity%20issues.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%3EThe%20support%20of%26nbsp%3Bthe%20above%26nbsp%3Bstandards%2C%20especially%20DNSSEC%2C%20will%20require%20investment%20and%20architecture%20changes%26nbsp%3Bto%20the%20Microsoft%20infrastructure%26nbsp%3B-%20an%20investment%20we%20believe%20is%20necessary%20to%20enhance%20protection%20for%20our%20customers.%26nbsp%3BAs%20this%20will%20require%20significant%20work%2C%20we%20will%20be%26nbsp%3Breleasing%26nbsp%3BDANE%20and%20DNSSEC%20for%20SMTP%26nbsp%3Bin%26nbsp%3Btwo%26nbsp%3Bphases.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20first%20phase%20will%20include%20only%20outbound%20support%20(mail%20sent%20outbound%20from%20Exchange%20Online)%20and%20we%20aim%20to%20enable%20this%20by%20the%20end%20of%20the%20calendar%20year%202020.%20The%20second%20phase%20will%20add%20inbound%20support%20for%20Exchange%20Online%20and%20we%20plan%20to%20enable%20that%20by%20the%20end%20of%202021.%3C%2FSPAN%3E%20%3CSPAN%3EFor%20both%20of%20those%20phases%2C%20corresponding%20TLS-RPT%20support%20will%20be%20provided.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWhile%20we%20integrate%20these%20changes%2C%20we%20want%20to%20ensure%20our%20customers%20know%20that%20there%20are%20third%20party%20solutions%20available%20for%20Exchange%20Online.%26nbsp%3BCustomers%20have%20the%20option%20to%20run%20their%20own%20SMTP%20gateways%20supporting%26nbsp%3BDNSSEC%26nbsp%3Band%20DANE%20for%20SMTP%20and%20they%20can%20create%20Outbound%20and%20Inbound%20connectors%20to%20route%20the%20email%20messages%20to%20and%20from%20Exchange%20Online.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWe%26nbsp%3Bare%20happy%20to%26nbsp%3Bannounce%26nbsp%3Bsupport%20for%20DNSSEC%20and%20DANE%20for%20SMTP%26nbsp%3Bto%20strengthen%20Office%20365%20Exchange%20Online%26nbsp%3Bemail%20security%20and%20provide%26nbsp%3Badvanced%20protection%20to%20our%20customers%3C%2FSPAN%3E%3CSPAN%3E.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23FF6600%22%3EThe%20Exchange%20Transport%20Team%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1275494%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EMicrosoft%26nbsp%3Bis%20committed%26nbsp%3Bto%20providing%20world-class%26nbsp%3Bemail%26nbsp%3Bsecurity%20solutions%26nbsp%3Band%20the%20support%20for%26nbsp%3Bthe%20%3C%2FSPAN%3E%3CSPAN%3Elatest%26nbsp%3BInternet%26nbsp%3Bstandards%20in%20order%20to%20provide%20advanced%20email%20protection%20for%20our%20customers.%26nbsp%3BToday%20we%20are%26nbsp%3Bannouncing%20that%20Exchange%20Online%20will%20be%20adding%20support%20for%20two%20new%20Internet%20standards%20specific%20to%20SMTP%20traffic.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1275494%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Eall%20posts%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAnnouncements%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%20Online%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eprotocols%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Etransport%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1286587%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1286587%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20the%20O365%20%22Exchange%20Online%22%20team%2C%20welcome%20to%20the%20DANE%20SMTP%20community%2C%20congratulations%20and%20thanks!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou'll%20be%20in%20good%20company%20with%20comcast.net%2C%20gmx.de%2C%20web.de%2C%20transip.nl%2C%20domeneshop.no%2C%20active24.com%2C%26nbsp%3Bone.com%2C%20protonmail.ch%2C%20loopia.se%2C%20...%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20hope%20that%20like%20Comcast%20et.%20al.%20you'll%20have%20the%20fortitude%20to%20enforce%20DANE%20policy%20even%20on%20the%20rare%20occasions%20that%20an%20occasional%20MX%20host%20has%20misconfigured%20TLSA%20records.%20The%20onus%20is%20on%20them%20to%20fix%20their%20settings%2C%20not%20everyone%20else%20to%20work%20around%20it.%26nbsp%3B%20The%20more%20large%20senders%20implement%20DANE%20validation%2C%20the%20less%20credible%20it%20will%20be%20for%20a%20misconfigured%20receiving%20system%20to%20attempt%20to%20shift%20blame%20to%20the%20sender.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20are%20presently%20around%201k%20(out%20of%2010.9%20million)%20DNSSEC-signed%20domains%20where%20TLSA%20record%20lookups%20ServFail%20due%20to%20broken%20NSEC%20chains%20or%20outright%20blocking%20of%20TLSA%20queries%20by%20misconfigured%20middle-boxes.%26nbsp%3B%20I'm%20working%20to%20get%20these%20fixed%2C%20and%20just%20this%20week%20a%20~600%20such%20domains%20were%20resolved.%20I%20expect%20to%20see%20a%20similar%20number%20again%20get%20resolved%20soon%2C%20well%20before%20you%20go%20live%2C%20leaving%20only%20a%20tiny%20fraction%20of%20little-known%20problem%20domains.%26nbsp%3B%20These%20too%20will%20have%20to%20fix%20the%20problems%20on%20their%20end.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPerhaps%20a%20prominent%20blog%20post%20announcing%20your%20intent%20to%20not%20downgrade%20security%20by%20glossing%20over%20problems%20with%20a%20tiny%20minority%20remote%20sites%20will%20help%20motivate%20timely%20remediation%20in%20advance%20of%20your%20deployment.%26nbsp%3B%20Good%20luck!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1287436%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1287436%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20news%20is%20great!%20adding%20new%20standards%20to%20the%20O365%20platform.%20With%20an%20ongoing%20move%20to%20the%20cloud%2C%20CSP's%20not%20introducing%20new%20standards%20was%20the%20limiting%20factor%20so%20far.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20looking%20at%20Viktor's%20comment%20it%20might%20even%20be%20wise%20to%20start%20TLS-RPT%20first%20to%20get%20everyone%20aware%20about%20their%20%22broken%22%20configurations%20before%20starting%20to%20apply%20DANE%20to%20connections.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20leaves%20me%20with%20other%20questions%20though%3A%3C%2FP%3E%3CUL%3E%3CLI%3EWhen%20will%20DMARC%20reporting%20for%20the%20O365%20platform%20be%20back%3F%20back%20in%202012%20Microsoft%20actively%20participated%20in%20the%20development%20of%20the%20standard%2C%20sending%20out%20reports%20from%20the%20Hotmail%2FOutlook.com%20platform.%20These%20services%20have%20now%20migrated%20to%20the%20same%20O365%20platform%2C%20but%20completely%20stopped%20sending%20out%20DMARC%20rua%20reports.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CLI%3EWhen%20will%20O365%20start%20respecting%20the%20DMARC%20policy%20set%20by%20a%20domain%20owner%3F%20Currently%20a%20decision%20was%20made%20to%20override%20the%20reject%20policy%20(oreject)%20and%20default%20it%20back%20to%20quarantine.%20From%20an%20O365%20Admin%20perspective%20there%20is%20no%20%22button%22%20to%20disable%20this%20behavior.%20Only%20by%20going%20through%20a%20workarounds%20you'll%20be%20able%20to%20get%20a%20similar%20result.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CLI%3EIn%20September%202018%2C%20together%20with%20TLS%20Reporting%20(TLS-RPT)%2C%26nbsp%3BSMTP%20MTA%20Strict%20Transport%20Security%20(MTA-STS)%20was%20released.%3CBR%20%2F%3EIf%20the%20goal%20is%20to%20secure%20TLS%20connections%20it%20should%20not%20matter%20which%20technology%20is%20available%20(DANE%20vs%20MTA-STS)%2C%20so%20if%20one%20is%20unable%20to%20implement%20DANE%20they%20have%20an%20alternate%20internet%20standard%20(MTA-STS)%20to%20make%20sure%20that%20their%20connection%20can%20be%20secured.%3C%2FLI%3E%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1289899%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1289899%22%20slang%3D%22en-US%22%3E%3CP%3ESupport%20for%20MTA-STS%20(RFC%208461)%20would%20be%20a%20welcome%20addition%20to%20this%20announcement.%20This%20could%20be%20as%20simple%20as%20saying%20that%20the%20certificate%20will%20always%20match%20the%20name%20on%20the%20MX%20record%20(example-com.%3CSPAN%3Email.protection.outlook.com).%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1290044%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1290044%22%20slang%3D%22en-US%22%3E%3CP%3EMy%20take%20on%20the%20situation%20is%20that%20the%20wildcard%20certificate%26nbsp%3Bis%20intentionally%20(not%20by%20accident)%20compatible%20with%20PKIX%20validation%20and%20so%20also%20inbound%20MTA-STS.%20Compatibility%20with%20a%20wildcard%20certificate%20is%20surely%20why%20the%20MX%20host%20names%20use%20a%20single-label%20prefix%20like%20%22example-com%22%20rather%20than%20a%20more%20natural%20multi-label%20prefix%20like%20%22example.com%22.%3C%2FP%3E%3CP%3EThe%20DNS%20subject%20names%20in%20the%20certificate%20are%3A%3C%2FP%3E%3CPRE%3Email.protection.outlook.com%0A*.mail.eo.outlook.com%0A*.mail.protection.outlook.com%0Amail.messaging.microsoft.com%0Aoutlook.com%0A*.olc.protection.outlook.com%0A*.pamx1.hotmail.com%3C%2FPRE%3E%3CP%3EConsequently%2C%20if%20a%20hosted%20domain%20wishes%20to%20publish%20an%20MTA-STS%20policy%2C%20it%20can%20already%20do%20so.%20For%20example%2C%20the%20policy%20for%20%22outlook.com%22%20(with%20MX%20host%20outlook-com.olc.protection.outlook.com)%20is%3A%3C%2FP%3E%3CPRE%3Eversion%3A%20STSv1%0Amode%3A%20testing%0Amx%3A%20*.olc.protection.outlook.com%0Amax_age%3A%20604800%3C%2FPRE%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1291101%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1291101%22%20slang%3D%22en-US%22%3E%3CP%3Ejust%20to%20confirm%20what%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F611774%22%20target%3D%22_blank%22%3E%40Viktor_Dukhovni%3C%2FA%3E%26nbsp%3Bmentioned%2C%20for%20anyone%20on%20O365%20it's%20possible%20already%20to%20setup%20MTA-STS%20(as%20long%20as%20they%20keep%20the%20certificates%20valid).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPersonally%20I%20did%20setup%20the%20mx%20as%3A%26nbsp%3B%3C%2FP%3E%3CPRE%3Emx%3A%20*.mail.protection.outlook.com%3C%2FPRE%3E%3CP%3EThe%20reason%20behind%20this%20is%20that%20Microsoft%20asks%20for%20a%20MX%20publication%20with%20%3CDOMAIN%3E-%3CTLD%3E.mail.protection.outlook.com%20from%20their%20%22wizard%22.%3C%2FTLD%3E%3C%2FDOMAIN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20only%20issue%20at%20this%20moment%20is%20that%20this%20works%20when%20the%20G-Suite%20platform%20(internet%2C%20MTA-STS%20capable)%20is%20communicating%20with%20(to)%20the%20O365%20platform%2C%20not%20the%20other%20way%20around%20(O365%20%26gt%3B%20G-Suite).%3C%2FP%3E%3CP%3ETo%20properly%20contribute%20to%20the%20email%20ecosystem%20internet%20standards%20need%20to%20be%20implemented%20from%20a%20sending%20AND%20receiving%20perspective%2C%20so%20both%20parties%20(Google%20%26amp%3B%20Microsoft%20and%20others)%20need%20to%20play%20ball.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1299000%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1299000%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F611774%22%20target%3D%22_blank%22%3E%40Viktor_Dukhovni%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F612124%22%20target%3D%22_blank%22%3E%40AlwindB%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20objective%20is%20to%20enforce%20the%20standard%20without%20a%20list%20of%20exceptions.%20Before%20we%20enable%20Opportunistic%20DANE%20for%20SMTP%2C%20we%20planned%20to%20run%20logging-only%20mode%20first%20and%20then%20analyze%20the%20results%20of%20the%20DANE%20validation.%20Depending%20on%20the%20outcome%2C%20we%20will%20evaluate%20if%20it%20makes%20sense%20to%20report%20the%20failures%20to%20domain%20owners%20which%20can%20help%20them%20to%20correct%20their%20configuration%20before%20we%20start%20to%20enforce%20the%20standard.%20If%20this%20approach%20would%20really%20not%20work%20for%20a%20few%20exceptions%2C%20we%20may%20have%20to%20give%20in.%3C%2FP%3E%0A%3CP%3EAlso%2C%20we%20are%20committed%20to%20deploy%20MTA-STS%20by%20the%20end%20of%202020.%20TLS-RPT%20will%20be%20available%20for%20both%20DANE%20and%20MTA-STS.%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1300491%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1300491%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F436883%22%20target%3D%22_blank%22%3E%40Leena03%3C%2FA%3E%26nbsp%3BThe%20plan%20you%20outlined%20is%20sound%20and%20addresses%20my%20concerns.%20Thanks%2C%20and%20good%20luck%20with%20the%20deployment.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1341549%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1341549%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F612124%22%20target%3D%22_blank%22%3E%40AlwindB%3C%2FA%3E%26nbsp%3BSending%20DMARC%20reports%20is%20in%20the%20plans.%20You%20can%20track%20the%20progress%20here%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Foffice365.uservoice.com%2Fforums%2F289138%2Fsuggestions%2F11094318%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Foffice365.uservoice.com%2Fforums%2F289138%2Fsuggestions%2F11094318%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F613397%22%20target%3D%22_blank%22%3E%40michaelkennedy%3C%2FA%3E%26nbsp%3BWork%20on%20MTA-STS%20is%20well%20underway%20and%20final%20testing%20is%20being%20performed.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1548161%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1548161%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20going%20to%20be%20future%20availability%20of%20DANE%20%2F%20DNSSEC%20%2F%20MTA-STS%20etc%20with%20on-premise%20Exchange%3F%3C%2FP%3E%3CP%3EIf%20so%2C%20is%20there%20a%20timeline%20for%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1548848%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1548848%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F741230%22%20target%3D%22_blank%22%3E%40AllanWallace%3C%2FA%3E%26nbsp%3BFor%20MTA-STS%2C%20there%20is%20no%20plan%20at%20this%20time%20for%20the%20outbound%20validation%20functionality%20to%20be%20added%20to%20Exchange%20Server.%20That%20said%2C%20customers%20who%20have%20a%20hybrid%20routing%20configuration%20(i.e.%20send%20emails%20out%20through%20Exchange%20Online%2FExchange%20Online%20Protection%20to%20the%20internet)%20will%20be%20covered%20by%20MTA-STS.%3C%2FP%3E%0A%3CP%3EFor%20inbound%20emails%2C%20there%20is%20nothing%20for%20Exchange%20Server%20(or%20Exchange%20Online%20for%20that%20matter)%20to%20do%20besides%20negotiate%20TLS%20so%20you%20can%20support%20MTA-STS%20for%20your%20domain%20today%20by%20hosting%20a%20policy.%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1548947%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1548947%22%20slang%3D%22en-US%22%3E%3CP%3EAlso%20for%20on-premise%20exchange%2C%20inbound%20DANE%20does%20not%20require%20anything%20special%20in%20Exchange%2C%20you%20just%20need%20a%20DNSSEC-signed%20domain%20and%20published%20TLSA%20records%20matching%20your%20server%20certificate.%20New%20code%20in%20Exchange%20is%20only%20needed%20for%20verifying%20DANE%20*outbound*.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThat%20said%2C%20inbound%20DANE%20requires%20monitoring%2C%20and%20a%20well%20thought%20out%2C%20automated%20certificate%20rollover%20process%20that%20does%20not%20periodically%20invalidate%20the%20published%20TLSA%20records.%20So%20while%20Exchange%20does%20not%20need%20new%20code%2C%20the%20%22orchestration%22%20of%20certificates%20and%20matching%20TLSA%20records%20can%20benefit%20from%20robust%20automation%2C%20and%20built-in%20monitoring.%26nbsp%3B%20Just%20%22fire-and-forget%22%20is%20not%20a%20good%20deployment%20model%20for%20DANE%2C%20planning%20and%20monitoring%20are%20key.%26nbsp%3B%20If%20appropriate%20orchestration%20tools%20were%20added%20to%20on-premise%20Exchange%20some%20day%2C%20that'd%20be%20super.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1624604%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1624604%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F436883%22%20target%3D%22_blank%22%3E%40Leena03%3C%2FA%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F324116%22%20target%3D%22_blank%22%3E%40The_Exchange_Team%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI've%20noticed%20TLS-RPT%20reports%20being%20sent%20since%20last%20week%20(for%20MTA-STS).%20Unfortunately%2C%20these%20reports%20do%20not%20follow%20RFC%20guidelines%2Frecommendations%20and%20even%20contain%20inconsistencies%20in%20report%20data%2C%20causing%20errors%20while%20processing.%20I%20would%20like%20to%20get%20in%20touch%20with%20someone%20from%20Microsoft%20to%20assist%20with%20the%20correction%20of%20these%20issues.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1852729%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1852729%22%20slang%3D%22en-US%22%3E%3CP%3EDNSSEC...%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ffeedback.azure.com%2Fforums%2F217313-networking%2Fsuggestions%2F13284393-azure-dns-needs-dnssec-support%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Ffeedback.azure.com%2Fforums%2F217313-networking%2Fsuggestions%2F13284393-azure-dns-needs-dnssec-support%3C%2FA%3E%3C%2FP%3E%3CP%3EMore%20then%205000%20votes%20and%201%C2%BD%20year%20old%20answer%20from%20Microsoft...%3C%2FP%3E%3CP%3EWhy%20should%20you%20then%20vote%20if%20they%20don't%20care...%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2063456%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2063456%22%20slang%3D%22en-US%22%3E%3CP%3EAny%20news%20regarding%20DNSSEC%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERegarding%20outbound%20support%20you%20aim%20to%20enable%20this%20by%20%3CSTRONG%3Ethe%20end%20of%20the%20calendar%20year%202020%3C%2FSTRONG%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20is%20the%20status%20for%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2240285%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2240285%22%20slang%3D%22en-US%22%3E%3CP%3EDNSSEC%20still%20not%20available%20as%20of%20March%2028%2C%202021.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2271781%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2271781%22%20slang%3D%22en-US%22%3E%3CP%3EWhat's%20the%20new%20planning%20for%20this%20implementation%2C%20as%20it%20looks%20that%20%22end%20of%202020%22%20won't%20be%20met%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2639057%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2639057%22%20slang%3D%22en-US%22%3E%3CP%3EDNSSEC%20-%20now%20its%20August%2012%2C%202021...%20I've%20been%20searching%20the%20internet%2C%20trying%20to%20locate%20%22end%20of%202020%22%2C%20but%20unfortunately%20I%20haven't%20been%20able%20to%20find%20it%20yet.%20If%20anyone%20knows%20where%20to%20find%20it%2C%20please%20post%20a%20link...%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2639430%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2639430%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1073521%22%20target%3D%22_blank%22%3E%40Martin_Mogensen_-_DK%3C%2FA%3E%26nbsp%3BThese%20dates%20are%20communicated%20in%20this%20very%20article%20you%20are%20replying%20to%20%3B)%3C%2Fimg%3E%3CBR%20%2F%3EIn%20the%20%22Our%20future%22%20part%20it%20says%3A%26nbsp%3B%3CSPAN%3EThe%20first%20phase%20will%20include%20only%20outbound%20support%20(mail%20sent%20outbound%20from%20Exchange%20Online)%20and%20we%20aim%20to%20enable%20this%20by%20the%20end%20of%20the%20calendar%20year%202020.%20The%20second%20phase%20will%20add%20inbound%20support%20for%20Exchange%20Online%20and%20we%20plan%20to%20enable%20that%20by%20the%20end%20of%202021.%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EFor%20both%20of%20those%20phases%2C%20corresponding%20TLS-RPT%20support%20will%20be%20provided.%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2731959%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2731959%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20very%20dissapointing%20that%20it's%20not%20implamented%20yet%2C%20and%20not%20even%20a%20new%20date%20about%20when.%3C%2FP%3E%3CP%3ENot%20sure%20if%20Microsoft%20ever%20reads%20this.%20Don't%20looks%20like....%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2732647%22%20slang%3D%22en-US%22%3ERe%3A%20Support%20of%20DANE%20and%20DNSSEC%20in%20Office%20365%20Exchange%20Online%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2732647%22%20slang%3D%22en-US%22%3E%3CP%3EDescription%20Status%20Tags%20Release%3C%2FP%3E%3CTABLE%3E%3CTBODY%3E%3CTR%3E%3CTD%3E%3CDIV%20class%3D%22align-cell%20collapsed-content%22%3E%3CP%20class%3D%22c-paragraph-3%20screen-reader-title%22%3EExchange%3A%20Adding%20Outbound%20Support%20for%20DNSSEC%2FDANE%20for%20SMTP%20to%20Exchange%20Online%3C%2FP%3E%3C%2FDIV%3E%3C%2FTD%3E%3CTD%3E%3CDIV%20class%3D%22align-cell%22%3EIn%20development%3C%2FDIV%3E%3C%2FTD%3E%3CTD%3E%3CDIV%20class%3D%22align-cell%22%3E%3CDIV%3EExchange%3C%2FDIV%3E%3CDIV%3EWorldwide%20(Standard%20Multi-Tenant)%3C%2FDIV%3E%3CDIV%3EGeneral%20Availability%3C%2FDIV%3E%3CDIV%3EDoD%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FTD%3E%3CTD%3E%3CDIV%20class%3D%22align-cell%22%3EDecember%20CY2021%3C%2FDIV%3E%3C%2FTD%3E%3C%2FTR%3E%3C%2FTBODY%3E%3C%2FTABLE%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Froadmap%3Ffilters%3D%26amp%3Bsearchterms%3D63212%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20365%20Roadmap%20%7C%20Microsoft%20365%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Apr 03 2020 08:42 AM
Updated by: