-
-
Notifications
You must be signed in to change notification settings - Fork 268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[enhancement]: Generate TLSA Records for DANE #397
Comments
@mdecimus is it possible to have the option where it uses the CA and not the cert signature ? |
Do you mean displaying the TLSA entries for trust anchors (type 2)? If you mean using the SubjectPublicKeyInfo rather than the entire certificate, both selectors are provided. |
An alternative could also be to have an option to keep using the same the private key for each Let's Encrypt certificate renewal. Then 3-1-1 should also work without having to change the record every 90 days. |
Since there Is already DNS access it should be relatively easy to manage this value automatically |
Only if you use the DNS update feature like for |
Hello mdecimus, We should only use 2 1 1 & 3 1 1 or by choice 2 1 2 & 3 1 2 (if sha512 is necessary) with letsencrypt. If the certificate gets renewed only the 3 1 1 entry needs to be updated in DNS. Delete all other entrys and check with: https://www.huque.com/bin/danecheck (give port 25, smtp, DANE-EE ) Best regards, |
Hi Marco, The webadmin will include all options, but you can decide which ones to add to your DNS server. |
Maybe for the "Not So" expert admins it could be marked green which are recommended or minimal required ;-). |
This will be added to the documentation. But once dynamic DNS updates are implemented I was thinking about hiding all the extra TLSA records under a "Show All" checkbox or something. |
That makes sense, I saw you changed the bug to enhancment for the technical domains #463. LG Marco |
Which feature or improvement would you like to request?
I recently discovered this project—cf-tlsa-acmesh written in Go that works with acme.sh to generate TLSA keys (and rollover keys). This would make it a lot simpler to rollout DANE for many servers.
I think this would be possible to lump together with #368 when/if there is ever support for automatically managing DNS records.
Is your feature request related to a problem?
I'm having a problem with...
Code of Conduct
The text was updated successfully, but these errors were encountered: