You are supposed to have all 10 TLSA records for R10-R14 and E5-E9 on both fqdns (open "backup" to find the rest: Chains of Trust - Let's Encrypt) because the intermediate will change without warning (10 to 11 and 5 to 6 randomly, and probably the others too).
You always need to send the intermediate(s) when using DANE-TA, as many clients won't be able to find it otherwise. Your DANE-TA only anchors the certificate's SPKI hash, but to verify that a client needs to see the certificate.
Also, as already mentioned: You need to anchor all intermediates used by Let's Encrypt - issuance will rotate randomly, and your DANE setup is bound to break lots of times otherwise.
4get your tests... i meanwhile tried some things around.... i mentioned that when i tried with the actual 2 1 1 entries for r10 and r11 the test will fail with them (actual it is like it should and it doesnt work (on the 3 1 1 entry its ok)
Now i have in DNS 3 1 1 and three 2 1 1 entries (r10/r11/r1)
Checking imap.hoerst.net 2a0a:4cc0:c0:33c:741d:20ff:fe2c:108e port 143
DANE TLSA 3 1 1 [cd54bc6c..]: OK matched EE certificate
DANE TLSA 2 1 1 [6ddac186..]: FAIL did not match any TA certificate
DANE TLSA 2 1 1 [2bbad93a..]: FAIL did not match any TA certificate
but the cert is from
Peer Certificate Chain:
0 CN=imap.hoerst.net
CN=R11,O=Let's Encrypt,C=US
so the "6ddac ..." entry should work
I'm only looking at smtp because using DANE on imap is kinda pointless, I know of no clients using it. I assume the issue is with the incomplete chain, as @Nummer378 told you above.
On smtp it works fine, you just have to add three more records for R12, 13 and 14
## Checking smtp.hoerst.net 152.53.129.213 port 25
DANE TLSA 2 1 1 [2bbad93a..]: OK matched TA certificate at depth 1
DANE TLSA 2 1 1 [6ddac186..]: FAIL did not match any TA certificate
DANE TLSA 3 1 1 [038f8849..]: OK matched EE certificate
It will give you all combinations of '3' and '2' TLSA records.
Just put it in a file and make it executable. It is from [ ietf-dane ] aka Viktor Dukhovni