On Sat, Dec 14, 2013 at 08:53:14PM +0000, Viktor Dukhovni wrote:
> On Sat, Dec 14, 2013 at 02:35:15PM -0600, /dev/rob0 wrote:
> 
> > > The trick is to find tools that make operating a DNSSEC zone
> > > relatively painless.  You get security, but it easier to mess
> > > up leaving the zone with stale signatures and thus essentially
> > > invisible to all DNSSEC-aware clients.  By all means deploy
> > > DNSSEC, but carefully.
> > 
> > Perhaps I am biased, but I use and recommend ISC BIND 9.9. The 
> > "auto-dnssec maintain;" zone option does most of the work. Used 
> > together with "update-policy local;" you get a simple means of 
> > updating your zone data with nsupdate(8).
> 
> Thanks for the tip, the OP may find that helpful.  Making use of
> DNSSEC as transparent as possible to the administrator is key to
> making it usable.
> 
> Since your zone is in fact DNSSEC signed, perhaps you should 
> consider enabling DANE for SMTP:

I was planning to do DANE this summer when the feature was 
implemented, but at the time my mail host had a too-old openssl. I 
think we're good now:

$ openssl version
OpenSSL 1.0.1e 11 Feb 2013

>     _25._tcp.mx3.nodns4.us. IN TLSA 3 1 1 
> FDC86639033F23BAB5B24DF459DE2742CF98FCB1BD747F71807C4DF294773323
>     _25._tcp.mx4.nodns4.us. IN TLSA 3 1 1 
> FDC86639033F23BAB5B24DF459DE2742CF98FCB1BD747F71807C4DF294773323

Hehe, oops. This exposes my postscreen MX policy test ruse (same 
certificate on both IP addresses.) (Yeah, I know, it doesn't matter; 
spammers are not going to check my TLSA records.)

Thanks for the reminder and help. I will do it this weekend.
-- 
  http://rob0.nodns4.us/
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

Reply via email to