* Viktor Dukhovni <postfix-users@postfix.org>:
> On Sun, Dec 15, 2013 at 06:49:20PM +0000, Viktor Dukhovni wrote:
> 
> > What certificate public key did you fingerprint?  Your root CA
> > certificate, or your server certificate?  Why did you specify usage 0?
> 
> It sure looks like your TLSA RR contains the public digest of your
> server certificate, and yet you specified "certificate usage 0",
> rather than "certificate usage 3" which is the correct usage in
> this case.  It would be helpful to know how you arrived at this
> choice.

This will fix the usage:

--- tlsagen_orig        2013-12-15 21:55:17.070898528 +0100                     
                                                                       
+++ tlsagen     2013-12-15 21:57:17.481758561 +0100
@@ -20,7 +20,7 @@
     $/=undef;
     ($a=<STDIN>) =~ s/(.)/sprintf("%02X", ord($1))/egs;
     printf "_%d._tcp.%s. IN TLSA %d %d %d %s\n",
-      $port, $host, $usage, $s, $m, $a;
+      $port, $host, $u, $s, $m, $a;
   ' "$@"
 }


> and for the selectors:
> 
>       1 - Certificate                 (draft Cert)
>       2 - Public-Key                  (draft SPKI)

draft-ietf-dane-ops-01 says: 

   The selector field specifies whether the TLSA RR matches the whole           
                                                                       
   certificate (Cert(0)) or just its subjectPublicKeyInfo (SPKI(1)).

Shouldn't it be this then?

        0 - Certificate                 (draft Cert)
        1 - Public-Key                  (draft SPKI)

That would correspond with tlsagen's current output on what I feed it.

p@rick

-- 
[*] sys4 AG
 
http://sys4.de, +49 (89) 30 90 46 64
Franziskanerstraße 15, 81669 München
 
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer
Aufsichtsratsvorsitzender: Florian Kirstein
 

Reply via email to