For Letsencrypt certificates I´d definitely go with 2 1 1 8D02536C887482BC34FF54E41D2BA659BF85B341A0A20AFADB5813DCFBCF286D and optionally the R4 derivate and add their successors when these are about to expire, rather than 3 1 1 and change every two months. Best Regards, Joachim
-----Ursprüngliche Nachricht----- Von: Viktor Dukhovni via Postfix-users <postfix-users@postfix.org> Gesendet: Donnerstag, 18. Mai 2023 15:12 An: postfix-users@postfix.org Betreff: [pfx] Re: DANE and DNSSEC On Thu, May 18, 2023 at 09:22:34PM +0900, Byung-Hee HWANG via Postfix-users wrote: > And now i added TLSA record for only *outbond* smtp server, > <yw-1204.doraji.xyz>. It is also your secondary MX host: https://stats.dnssec-tools.org/explore/?doraji.xyz the primary MX host does not yet have TLSA records. The detailed status is: doraji.xyz. IN MX 1871 yw-0919.doraji.xyz. doraji.xyz. IN MX 1895 yw-1204.doraji.xyz. _25._tcp.yw-0919.doraji.xyz. IN TLSA ? ; NXDOMAIN _25._tcp.yw-1204.doraji.xyz. IN TLSA 3 1 1 b4b06c36727808cb3e272f438cc6f1a77ee370c50dfb24eb5774a6113e4c6c0f yw-1204.doraji.xyz[185.17.255.72]: pass: TLSA match: depth = 0, name = yw-1204.doraji.xyz TLS = TLS13 with AES256GCM-SHA384,X25519,PubKeyALG_RSA name = yw-1204.doraji.xyz depth = 0 Issuer CommonName = R3 Issuer Organization = Let's Encrypt notBefore = 2023-03-20T06:03:54Z notAfter = 2023-06-18T06:03:53Z Subject CommonName = yw-1204.doraji.xyz pkey sha256 [matched] <- 3 1 1 b4b06c36727808cb3e272f438cc6f1a77ee370c50dfb24eb5774a6113e4c6c0f depth = 1 Issuer CommonName = ISRG Root X1 Issuer Organization = Internet Security Research Group notBefore = 2020-09-04T00:00:00Z notAfter = 2025-09-15T16:00:00Z Subject CommonName = R3 Subject Organization = Let's Encrypt pkey sha256 [nomatch] <- 2 1 1 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d depth = 2 Issuer CommonName = DST Root CA X3 Issuer Organization = Digital Signature Trust Co. notBefore = 2021-01-20T19:14:03Z notAfter = 2024-09-30T18:14:03Z Subject CommonName = ISRG Root X1 Subject Organization = Internet Security Research Group pkey sha256 [nomatch] <- 2 1 1 0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3 yw-1204.doraji.xyz[2a03:ebc0:5000:12::10]: pass: TLSA match: depth = 0, name = yw-1204.doraji.xyz TLS = TLS13 with AES256GCM-SHA384,X25519,PubKeyALG_RSA name = yw-1204.doraji.xyz depth = 0 Issuer CommonName = R3 Issuer Organization = Let's Encrypt notBefore = 2023-03-20T06:03:54Z notAfter = 2023-06-18T06:03:53Z Subject CommonName = yw-1204.doraji.xyz pkey sha256 [matched] <- 3 1 1 b4b06c36727808cb3e272f438cc6f1a77ee370c50dfb24eb5774a6113e4c6c0f depth = 1 Issuer CommonName = ISRG Root X1 Issuer Organization = Internet Security Research Group notBefore = 2020-09-04T00:00:00Z notAfter = 2025-09-15T16:00:00Z Subject CommonName = R3 Subject Organization = Let's Encrypt pkey sha256 [nomatch] <- 2 1 1 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d depth = 2 Issuer CommonName = DST Root CA X3 Issuer Organization = Digital Signature Trust Co. notBefore = 2021-01-20T19:14:03Z notAfter = 2024-09-30T18:14:03Z Subject CommonName = ISRG Root X1 Subject Organization = Internet Security Research Group pkey sha256 [nomatch] <- 2 1 1 0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3 Since your certificate is from Let's Encrypt, you've probably configured automatic renewal. If you haven't also implemented *monitoring* of your DANE TLSA configuration that checks whether the TLSA records match the certificate chain, you should do that immediately, and ideally before publishing TLSA records for any servers carrying "non-test" traffic. You can publish TLSA records for some test host with a self-signed cert, and check monitoring detects incorrect TLSA records when mismatched TLSA records are configured (and is not complaining when the TLSA records are correct). You then also need to make sure that your certificate rollover process is robust, and either keeps the public key unchanged, or you pre-publish matching TLSA records for future keys alongside current keys. Setting up inbound DANE requires operational diligence. Do consider implemting DANE, but not as a fashion statement, rather only because you understand how to coordinate certificate management with DANE TLSA record upkeep. -- Viktor. P.S. Your certificate chain from Let's Encrypt includes a cross-cert for the ISRG root from the expired DST root. This is obsolete, if using "certbot", make sure your "renewal.conf" includes the "reuse_key" and "preferred_chain" settings below in the "[renewalparams]" setction. [renewalparams] reuse_key = True preferred_chain = ISRG Root X1 ... adjust accordingly if using some other ACME client. _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org