> Randy, I'm disappointed
and i embarrassed. clearly i blew it when creating the new mx target.
i just regenerated it with
m0.rg.net:/home/randy# openssl x509 -in
/etc/letsencrypt/live/m0.rg.net/fullchain.pem -noout -pubkey | openssl pkey
-pubin -outform DER | openssl sha256
SHA2-256(stdin)=
d88abefdf8f71549fba0fcb0428bcdd7c4d9014b6ed796214c6e21964c84daaf
and the mx target
Port: 25
Domain name: m0.rg.net
StartTLS app: smtp
passws shuumon's test https://www.huque.com/bin/danecheck
> I' like to suggest some serious attention to monitoring
but is there a script in can install and run nightly to which i can feed
the list of smtpd/dane sites to be checked without going down the
haskell and stack rabbit hole? for TLS, i.e. https: imaps: etc, i use a
symple python hack, `tls-expiration-monitor`, which i think i got
via/from sra some years back.
randy
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]