On 11/10/2015 04:30 AM, Phil Stracchino wrote:
On 11/09/15 22:55, Viktor Dukhovni wrote:
I would also like to encourage more of the administrators on this
list to publish TLSA records, but keep in mind that this is an
operational commitment, not a fashion statement. Once you publish
TLSA records you MUST keep them accurate while performing future
key/certificate updates (or changing issuing CAs if you're using
DANE-TA(2) TLSA records).
[...]
If you can do that, please go ahead and publish TLSA records for
the MX hosts of your DNSSEC signed domains. If that's too complex
at this time, wait. The documentation and tools will improve, and
it is better to not publish at all than to publish broken records
that create problems for both senders (other domains) and receivers
(you).
This is where I admit that I haven't gotten around to DNSSEC signing
yet. But then, mine is a very small domain with only one external IP.
From my own personal experience, start with a very short TTL and do not
make TLSA records until you have a process down for rotating zone
signing keys that works.
I currently use a one hour TTL and I do not feel a need to ever increase
that, but when I first started playing with DNSSEC I used a 5 minute TTL
so that when I made mistakes the impact was short.
Even though all but one of my TLS certificates are signed by a CA, I
always specify them as Type 3 in the TLSA record, not Type 1, even for
https. It turns out that specifying Type 1 doesn't add any real world
security at all, applications (like browsers) that want CA signed certs
still have to verify themselves, so I do not see a benefit to specifying
a TLSA record as Type 1.
I now am of the opinion that Type 0/1 TLSA records should be depricated
as there is not, at least to me, a real world value to them. But I am
not an expert in that area.
It is easier to experiment with a web server with TLSA because a bad
TLSA record won't cause a loss of service to most people as most (all?)
browsers don't care about TLSA without an extension.
Myself, I have TLSA records for my two mail servers, both very low
volume, but I do not yet run postfix in DANE mode. Soon I will start
doing that, but I'm waiting for increased DANE adoption and watching for
issues, like the .mil issue that started this thread, before I take that
step.
My DNS servers do DNSSEC validate so I at least get some MITM protection
even without postfix running in DANE mode.