On Fri, Dec 13, 2013 at 03:11:38PM -0500, John Allen wrote:

> Does anybody know of a good,but simple write up on DANE and TLSA.
> It has to be simple enough for me to understand (assume idiot).

An explanation of what DANE TLSA is for[*]?

Or how to set up a Postfix to work with it?

If the latter, setting up a client to verify DANE TLSA?

    http://www.postfix.org/TLS_README.html#client_tls_dane

Or setting up server to be verifiable with DANE TLSA?

    There is some text on this in TLS_README in the server certificate
    section, but we could perhaps add a DANE_README at some point
    or expand the server text if it is not sufficiently detailed.
    The main difficulty with server-side DANE is that your zone
    must be DNSSEC signed.  Deployment of DNSSEC is still fairly thin.
    With a bit of luck DANE might motivate folks to consider DNSSEC.

-- 
        Viktor.

[*]

DANE TLSA replaces the multitude of trusted SSL certificate
authorities, that can issue certificates for any dane, with the
hierarchy of DNSSEC authorities.

Each domain can sign the keys of its child domains and the data
records of its own zones including TLSA records which can bind
service end-points (_25._tcp.mail.example.com) to associated
certificates, either the leaf certificate:

    _25._tcp.mail.example.com IN TLSA 3 1 1 <sha256 digest of public key> 

or a chosen (public or private) issuing CA:

    _25._tcp.mail.example.com IN TLSA 2 1 1 <sha256 digest of public key> 

In the latter case the server's chain file MUST include the issuing CA.

Reply via email to