On Fri, Jan 10, 2014 at 12:17:26AM +0000, Viktor Dukhovni wrote:

More proof-reading might be a good idea:

>       ; Domain-wide TA CERT TLSA RR, aliased from each service:
>       ;
>       _25._tcp.mx.example.com. IN CNAME 2.1.1._tlsa.example.com.
>       2.1.1._tlsa.example.com. IN TLSA 2 0 1 {TA CERT SHA2-256 digest}

The "2.1.1" should have been a  "2.0.1":

        ; Domain-wide TA CERT TLSA RR, aliased from each service:
        ;
        _25._tcp.mx.example.com. IN CNAME 2.0.1._tlsa.example.com.
        2.0.1._tlsa.example.com. IN TLSA 2 0 1 {TA CERT SHA2-256 digest}

The reason for "2 0 1" is that with "2 0 1" records Postfix honours
various properties in the TA certificate.  For example, path length
constraints, ...  With "2 1 1", the public key is trusted directly,
and the rest of the TA certificate is ignored.

So I had the right TLSA parameters, but a misleading associated
domain name.

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to