Skip to main content

New

Test your email deliverability

Send a test email and get a complete diagnosis of your SPF, DKIM and DMARC authentication in seconds.

  • Real send test
  • Instant diagnosis
  • No signup required

DANE TLSA Checker

DANE check: look up and validate TLSA records

Check whether a domain has DANE TLSA correctly configured. Our tool performs a DNS lookup of TLSA records, verifies DNSSEC signatures, validates syntax, and checks the match with the server certificate.

TLSA DNS lookup

Automatically queries TLSA records for each MX server of the domain. Displays the raw DNS response and detected values.

DNSSEC verification

Checks that the DNSSEC chain is complete and valid. Without DNSSEC, TLSA records cannot be used by MTAs.

Certificate validation

Verifies that TLSA data matches the TLS certificate presented by the mail server. Detects mismatches after certificate renewal.

Complete analysis

RFC 6698/7672 compliance check including usage fields, selector, matching type, and best practice recommendations.

SMTP diagnostics

Connects to the mail server via STARTTLS to retrieve the current certificate and compare it to published TLSA records.

What does this DANE TLSA checker verify?

A DANE misconfiguration silently blocks mail from security-conscious senders. Government agencies, banks, and major providers validate DANE before delivering. This tool catches problems before they cause rejected mail.

The checker performs five verification steps:

  1. MX resolution: Identifies the domain's mail servers
  2. TLSA lookup: Queries _25._tcp.hostname for TLSA records
  3. DNSSEC verification: Confirms the signature chain is complete and valid
  4. Syntax validation: Checks RFC 6698/7672 compliance for each field
  5. Certificate match: Connects via STARTTLS and compares the live certificate to TLSA data

Understanding DANE TLSA records

DNS location

TLSA records live at a specific DNS name derived from the mail server hostname, not the domain itself. This is the most common deployment mistake.

_25._tcp.mail.captaindns.com.  IN  TLSA  3 1 1 2bb183af2e2b295b...

Critical: If captaindns.com has MX mail.captaindns.com, publish the TLSA at _25._tcp.mail.captaindns.com. Publishing at _25._tcp.captaindns.com fails silently.

Record structure

FieldValuesMeaning
Certificate Usage0 (PKIX-TA), 1 (PKIX-EE), 2 (DANE-TA), 3 (DANE-EE)Constraint type
Selector0 (Cert), 1 (SPKI)Part of the certificate matched
Matching Type0 (Full), 1 (SHA-256), 2 (SHA-512)Comparison method
Certificate DataHexadecimalHash or full data
3 1 1 <sha256-hash>
  • Usage 3 (DANE-EE): No PKIX validation needed
  • Selector 1 (SPKI): Survives renewals with the same key
  • Matching Type 1 (SHA-256): Compact and secure

The role of DNSSEC

DANE without DNSSEC is worthless. An unsigned TLSA record offers zero security: any attacker who can manipulate DNS can also forge TLSA data. DNSSEC prevents this.

Chain of trust

DNS Root (.) → TLD (.com) → Domain (captaindns.com) → TLSA record
    DNSSEC        DNSSEC          DNSSEC                Signed

Every level of the DNS hierarchy must be signed. One missing link breaks the entire chain. Unsigned TLSA records are treated as nonexistent by compliant MTAs.

What our tool checks

CheckDescriptionImpact if failed
Signed zoneDomain has DNSSEC keysTLSA records ignored
Valid chainSignatures are verifiableTLSA records ignored
Non-expired signatureRRSIGs are still validTLSA records temporarily ignored

Common issues detected

No TLSA record found

Cause: The domain has not configured DANE Impact: No DANE protection for inbound mail Fix: Generate a DANE TLSA record and publish it in DNS

DNSSEC not enabled

Cause: The domain is not DNSSEC-signed Impact: TLSA records are ignored even if they exist Fix: Enable DNSSEC at your registrar and DNS host

Certificate hash out of sync

Cause: The TLS certificate was renewed without updating the TLSA record Impact: DANE-aware MTAs refuse the connection or fall back to opportunistic TLS Fix: Update the TLSA hash with the new certificate. Use DANE-TA (usage 2) or SPKI selector (1) with key reuse to avoid this issue.

TLSA at the wrong location

Cause: Record published for the domain instead of the MX server Impact: Sending servers cannot find the record Fix: Publish at _25._tcp.<mx-hostname>, not at _25._tcp.<domain>


Certificate rotation strategy with DANE

Certificate rotation is the #1 cause of DANE outages. A renewed certificate with a new key invalidates existing TLSA records instantly. Plan your rotation strategy before deploying DANE.

Strategy 1: DANE-TA (best for Let's Encrypt)

Pin the CA certificate instead of the server certificate:

2 0 1 <sha256-of-CA-certificate>

Advantage: The TLSA record survives every renewal, as long as the same CA signs your certificates. Trade-off: Less strict than pinning the exact server certificate.

Strategy 2: DANE-EE with key reuse

Reuse the same private key across renewals:

3 1 1 <sha256-of-public-key>

Advantage: Strongest pinning. The SPKI hash stays constant across renewals. Trade-off: Requires configuring key reuse (--reuse-key in Certbot). Key compromise requires both certificate and TLSA rotation.

Strategy 3: Dual record rollover

Publish both the current and future TLSA records before rotating the certificate:

_25._tcp.mail.captaindns.com.  IN  TLSA  3 1 1 <current-cert-hash>
_25._tcp.mail.captaindns.com.  IN  TLSA  3 1 1 <future-cert-hash>

After rotation, remove the old record. This approach guarantees zero downtime but requires careful coordination.


DANE and SMTP: protecting mail in transit

Without DANE, SMTP encryption is opportunistic: a MitM attacker can strip TLS and read emails in plaintext. DANE makes TLS mandatory and verifiable.

How DANE works for SMTP

  1. The sending server resolves the MX for captaindns.com
  2. It queries TLSA records at _25._tcp.<mx-hostname>
  3. It validates the TLSA response via DNSSEC
  4. It connects via STARTTLS and compares the certificate to TLSA data
  5. Certificate matches → secure delivery confirmed
  6. Certificate mismatch → delivery refused (not downgraded)

Difference from opportunistic TLS

AspectOpportunistic TLSDANE
Certificate verificationNone (accepts any)Via TLSA record
MITM protectionNoYes
Non-TLS fallbackYesNo (by default)
PrerequisiteNoneDNSSEC

FAQ - Frequently asked questions

Q: What does the DANE TLSA Checker verify?

A: Our checker performs a DNS lookup of TLSA records on your domain, validates their syntax, verifies DNSSEC signature status, checks the match with the mail server certificate, and reports configuration issues.


Q: Why is my DANE TLSA check failing?

A: Common causes: DNSSEC not enabled on the domain, TLSA records not published at the correct location (_25._tcp.mail.captaindns.com), certificate hash out of sync after renewal, or incorrect usage/selector/matching type combination.


Q: What is the correct DNS name for SMTP TLSA records?

A: SMTP TLSA records must be published at _port._protocol.hostname, typically _25._tcp.mail.captaindns.com. The hostname must be that of the target MX server, not the domain itself.


Q: How does DANE protect mail in transit?

A: DANE prevents man-in-the-middle attacks on SMTP connections by letting the sending server verify the TLS certificate via DNS/DNSSEC instead of relying solely on certificate authorities.


Q: How often should I check my DANE TLSA records?

A: Check after every TLS certificate renewal, after any DNS changes, and monthly. Certificate expiration is the number one cause of DANE failures.


Q: Does DANE work with Let's Encrypt certificates?

A: Yes, but plan for 90-day renewals. DANE-TA (usage 2) with the Let's Encrypt CA certificate is easier. DANE-EE (usage 3) with key reuse (--reuse-key in Certbot) works too.


Complementary tools

ToolPurpose
DANE TLSA ValidatorValidate syntax before publication
DANE TLSA GeneratorCreate a TLSA record from a certificate
MTA-STS Record CheckCheck MTA-STS policy (alternative TLS security)
TLS-RPT Record CheckMonitor TLS failures via reports
SMTP CheckCheck the STARTTLS connection that DANE protects
Email domain auditComplete email authentication audit

Useful resources