> Randy, I'm disappointed and i embarrassed. clearly i blew it when creating the new mx target.
i just regenerated it with m0.rg.net:/home/randy# openssl x509 -in /etc/letsencrypt/live/m0.rg.net/fullchain.pem -noout -pubkey | openssl pkey -pubin -outform DER | openssl sha256 SHA2-256(stdin)= d88abefdf8f71549fba0fcb0428bcdd7c4d9014b6ed796214c6e21964c84daaf and the mx target Port: 25 Domain name: m0.rg.net StartTLS app: smtp passws shuumon's test https://www.huque.com/bin/danecheck > I' like to suggest some serious attention to monitoring but is there a script in can install and run nightly to which i can feed the list of smtpd/dane sites to be checked without going down the haskell and stack rabbit hole? for TLS, i.e. https: imaps: etc, i use a symple python hack, `tls-expiration-monitor`, which i think i got via/from sra some years back. randy _______________________________________________ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org