raf via Postfix-users <postfix-users@postfix.org> writes:

> On Thu, May 11, 2023 at 03:17:21PM +0900, Byung-Hee HWANG via Postfix-users
> <postfix-users@postfix.org> wrote:
>
>> Hellow Postfix hackers,
>> 
>> I have a questions while reading DANE docs. Is DNSSEC mandotary? For
>> making DANE mail server.
>> 
>> For now i'm running two postfix servers in public. Actually i'm beginner
>> in both DANE and DNSSEC.
>> 
>> Any comments welcome!
>> 
>> Sincerely, Byung-Hee
>
> Hi Byung-Hee,
>
> As others have said, if you want incoming DANE, you need DNSSEC.
> Bind9 makes it incredibly easy to enable DNSSEC. It's literally
> two extra lines in your configuration (unless you get fancy with
> automatic expiry and rollover - and that's easy too), plus you
> need to supply some information to your domain registrar for them
> to put into their servers. If your domain registrar doesn't support
> DNSSEC, or doesn't make it easy, find one that does. You'll need
> to interact with them every time you rollover your DNSSEC keys
> (e.g., maybe annually).

Thank you! I'll regard it, step by step.

> As for the TLSA records you need to create for your mail servers,
> I recommend my "danectl" program which can generate TLSA records
> for you to publish in the DNS, and you can use it to monitor that
> they have been published. Recent versions include a couple of adapters
> to help publish the TLSA records in the DNS, but only if you edit your
> own bind9 zone files or use nsupdate for a dynamic zone. A big
> prerequisite of danectl is certbot to handle the actual key/certificate
> generation. danectl doesn't work with any other ACME client.

Yes i did check it danectl by Googling, thanks!

> There are technically many ways to do TLSA DANE but only one great
> way (TLSA 3 1 1 current + next) which is what danectl supports.
> The idea is to always have two keys/certificates and their corresponding
> TLSA records available for use all the time: the current one, and the
> next one. Whenever you want to rollover your key, you can immediately
> switch to the next one which is already published in the DNS and
> ready to go while you prepare the new next key/certificate and its
> corresponding TLSA record (for the next rollover). This ensures that
> every rollover works seamlessly because you never have the situation
> where things aren't working while your TLSA records are propagating
> around the DNS because they were published well before they were
> required.
>
> Here are some wikis that might help:
>
>   https://github.com/baknu/DANE-for-SMTP/wiki
>   https://github.com/internetstandards/toolbox-wiki
>
> cheers,

Thanks raf!

At above wiki, i found EMSP guide line in Germany. Because my mail
server (yw-1204.doraji.xyz) is located in Frankfurt, Germany.


All docs and comments are useful for me. Thanks again raf!


Sincerely, Byung-Hee

-- 
^고맙습니다 _布德天下_ 감사합니다_^))//
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to