On Sun, Dec 06, 2015 at 12:38:21AM +0000, Viktor Dukhovni wrote:

> My DANE SMTP survey has so far found 19 domains with 11 distinct
> LE certificates, whose expiration dates are:
> 
>    2 ; Expiration = 2016-02-01T10:02:00Z
>    1 ; Expiration = 2016-02-02T14:15:00Z
>    1 ; Expiration = 2016-02-02T14:29:00Z
>    1 ; Expiration = 2016-02-08T15:58:00Z
>    4 ; Expiration = 2016-02-08T19:45:00Z
>    2 ; Expiration = 2016-02-14T20:07:00Z
>    3 ; Expiration = 2016-02-18T11:48:00Z
>    2 ; Expiration = 2016-02-22T03:22:00Z
>    1 ; Expiration = 2016-02-22T05:57:00Z
>    1 ; Expiration = 2016-02-28T00:02:00Z
>    1 ; Expiration = 2016-03-02T21:45:00Z
> 
> IIRC automated renewal attempts kick in after 60 days with 90 days
> total, so I'll not see how well the combination of LE certificate
> renewal with DANE TLSA records works for these users until the
> beginning of January.

I might note that the 11 distinct certificates are associated with 12
distinct MX hosts, for which the TLSA record types are:

   8    3 0 1   - Breaks with automated key rotation sans DNS update
   1    3 0 2   - Breaks with automated key rotation sans DNS update
   2    3 1 1   - Works if certificate rotation leaves the key unchanged
   1    2 0 1   - Works provided issuer certificate is unchanged.

The "2 0 1" site published a TLSA record for the LE intermediate
issuer CA, not the ultimate root CA.  That seems to have a 5 year
lifetime, but it is not clear how often a new intermediate will be
fielded.  That user will have to watch out for that:

    Subject = CN=Let's Encrypt Authority X1,O=Let's Encrypt,C=US
    Issuer = CN=DST Root CA X3,O=Digital Signature Trust Co.
    Not before = 2015-10-19T22:33:36Z
    Not after  = 2020-10-19T22:33:36Z

-- 
        Viktor.

Reply via email to