So, I currently am using an e-mail proxy. It forwards the mails, but I cannot see them in my murena inbox. When I let the mails forward to another mail provider, I receive the mails. So, there must be a problem with murena mail atm.
I am having this problem, too, but only with emails forwarded from my Hotmail account and I am not using a proxy. They never show up in the Murena inbox, but they will show up in my Proton inbox if I forward them there. I don’t get a bounceback and they are not in Spam. I will file a ticket with Tech Support unless anyone has a suggestion.
I have problem too. I have tested with my outlook and Simplelogin account.
From outlook to murena: failed
murena → outlook: OK
Simplelogin → murena: failed
It seems that murena has a misconfiguration in DNS which caused DANE validation failure.
Here is the error message from outlook when I tried to send to murena:
Diagnostic information for administrators:
Generating server: SY0P300MB0743.AUSP300.PROD.OUTLOOK.COM
Receiving server: SY0P300MB0743.AUSP300.PROD.OUTLOOK.COM
REDACTED@murena.io
7/9/2025 12:06:25 AM - Server at SY0P300MB0743.AUSP300.PROD.OUTLOOK.COM returned '550 5.7.323 tlsa-invalid: The domain failed DANE validation(450 4.7.323 tlsa-invalid: The domain failed DANE validation)'
7/8/2025 11:56:18 PM - Server at murena.io (95.217.246.96) returned '450 4.7.323 tlsa-invalid: The domain failed DANE validation [Message=450 4.7.323 tlsa-invalid: The domain failed DANE validation] [LastAttemptedServerName=murena.io] [LastAttemptedIP=95.217.246.96:25] [SmtpSecurity=11;-1] [SY2PEPF00005069.ausprd01.prod.outlook.com 2025-07-08T23:56:25.004Z 08DDBE64B054E0CE](450 4.7.323 tlsa-invalid: The domain failed DANE validation)'
seems the shared TLSA selector (2 1 1) is the issue. I guess as both 443 and 25 tcp ports are cname aliased to the same selector at _dane.domain, but SMTP limits the record use to 2 types (3 1 1 / 2 0 1) - this is the hiccup?
Edit: 2 1 1 isn’t really verboten, but needs publishing the whole group of digests to be solid (the notes link).
As of writing I see the R3 cert published in the e.email TLSA record, R11 in ecloud.global… while the TLSA cert chain offered on starttls to ecloud was signed by the R10 intermediate… misaligned?
private CA? it’s letsencrypt. DNSSEC can be valid, but DANE still fail. The TLSA record says "hey validate up until the place in the certificate chain that I pointed this selector at - and then you show the connecting SMTP a certificate with a signing chain without any certificate this matches to, bang, no validation. The resolution is doing either as the “note” says of the letsencrypt person: publish all certs in the TLSA rec that can be used by LE to hand you out a ssl cert so it will be found eventually - or go to mode 3 1 1 and use the certificates private key without relying on a CA (DANE-EE vs DANE-TA).
You’ll see the intermediate is R10, but that TLSA record 6DDAC18698F7F1F7E1C69B9BCE420D974AC6F94CA8B2C761701623F9 is the R11 intermediate. This breaks the chain of trust. If on renewal by accident R11 will be used for the new tls cert it will work again. That is why with the discouraged(?) 2 1 1 it’s advised to publish the whole group that can sign the cert.
This all came about because of the recent renewal of that cert (Not Before: Jul 6 00:05:15 2025 GMT).
Hello. Here is a screenshot of Certificate Transparency log.
It seems that the certificate for MX server mail.ecloud.global was renewed 3 days ago(on 2025-07-06), and my problem(can not receive from outlook) started precisely at that time.
nice screenshot, so things worked pretty well Feb-July (I guess the tlsa then was just updated, but the underlying issue is not publishing the group if staying with the 2 1 1 mode)
Okay guys, so I’m not very familiar with e-mail backend technology.
All I have observed at the moment is that I do not get mails from my proxy service. I can receive mails however if I send myself mails from another address. So I don’t really know if it’s the proxy service or murena where the problem lies…
things are better now, both ecloud.global tlsa and smtp ssl cert R10 signed, but not yet the whole group in the tlsa
But yes, that report has it right and provides a verbose explanation… bookmark (Edit: ah no - the report was made when smtp was already fine, but then broke 443 - the explanation in there still applies though)
Would it be possible for Murena to give notifications prior to certificate updates? Like a reminder, when mail will not work for a few days? Or is this just unexpected behaviour, that can’t be predicted?
Because I simply wouldn’t notice, if important mails would not arrive.
it’s a reminder to set up a dane probe continously monitoring for failure and let danebot do cert rollover. Enduser shouldn’t see disruptions. It’s a lot of rfcs to get familiar with if you’re not a dedicated mail person and murena is a mixed shop
will take to gitlab. Immediate issue was gone 11h ago already. Depends on implementation if it has a chance to come back on next cert renewal (10-12 weeks)
Hello. The configuration 2 1 1 6DDAC…3F9 means that
I only trust a private CA, and its SPKI hash is Lets Encrypt R11
It seems that murena have fixed this issue by setting TLSA record to “2 1 1 LE-R10”. They might have to manually update the record about 2 months later, and may trigger another service outage if they forget. (ACME protocol usually renews a certificate when it has passed 2/3 of its life span).
the spki hash part is right - but that report message has the wrong intro, letsencrypt is a public CA, they sign our certs right?
I guess murena integrated the tlsa part into their mail cert renewal automation. I don’t think this will crop up again significantly. They don’t use R10+R11 and their backup intermediates in a group of tlsa records, something that is more robust for rollovers as the TTL gap will not matter when the two records can get out of sync on renewal for a few minutes