On Mon, Feb 10, 2025 at 04:14:36PM +0100, Danjel Jungersen via Postfix-users 
<postfix-users@postfix.org> wrote:

> Hey.
> 
> I have read something about DANE.
> 
> I have seen very different recommendations.
> 
> I have decided to give it a shot.
> 
> But I figured that "someone" here (maybe Viktor??) may be able to tell me
> the best / official place to look for information and help for the best
> implementation.
> 
> Currently I'm running postfix (and rspamd if that's relevant...) on debian
> stable.
> 
> All the best!
> Danjel

Hi, I have written a nice tool for managing DANE tlsa
records (and all the other DANE records: sshfp,
openpgpkey, smimea, for what that's worth). It's at:

        https://github.com/raforg/danectl/

And Viktor has another nice tool for DANE tlsa records.
It's at:

        https://github.com/tlsaware/danebot/

Both rely on certbot for your actual certificates. If
you are already using certbot, and are happy for it to
remain in charge, danectl might be more suitable. It
lets you "adopt" an existing certbot certificate
lineage for DANE usage, and then "duplicate" it so as
to always have a "next" certificate ready to rollover
to.

On the other hand, if you aren't already using certbot,
danebot might be more suitable, as it drives certbot
and takes over from certbot's own scheduled renewals.
Although it's fine if you are already using certbot and
are happy for danebot to take over from it.

In either case, you will need to arrange for tlsa
records to be published to the DNS. There are many ways
to do this depending on your DNS service provider, and
so isn't really handled by either danectl or danebot (I
think?) themselves. However, danectl does come with
output adapters to make it easier to publish and revoke
tlsa records, but they only cover two methods so far:
modifying a bind9 zonefile, and generating nsupdate
commands. More methods are always welcome.

The main advice I have is to, whatever you do,
implement the "3 1 1" (current + next) scheme which is
supported by both danebot and danectl. It's the scheme
that doesn't require you to depend on any keys or
certificates other than your own. You don't need to
worry about what any certificate authorities do with
their keys. So you won't be faced with any surprises.
You can rollover your keys when you want to.

cheers,
raf

_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to