> Randy, I'm disappointed

and i embarrassed.  clearly i blew it when creating the new mx target.

i just regenerated it with

m0.rg.net:/home/randy# openssl x509 -in 
/etc/letsencrypt/live/m0.rg.net/fullchain.pem -noout -pubkey | openssl pkey 
-pubin -outform DER | openssl sha256
SHA2-256(stdin)= 
d88abefdf8f71549fba0fcb0428bcdd7c4d9014b6ed796214c6e21964c84daaf

and the mx target

    Port: 25
    Domain name: m0.rg.net
    StartTLS app: smtp

passws shuumon's test https://www.huque.com/bin/danecheck

> I' like to suggest some serious attention to monitoring

but is there a script in can install and run nightly to which i can feed
the list of smtpd/dane sites to be checked without going down the
haskell and stack rabbit hole?  for TLS, i.e. https: imaps: etc, i use a
symple python hack, `tls-expiration-monitor`, which i think i got
via/from sra some years back.

randy
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to