On Mon, Jun 06, 2016 at 05:31:49PM +0200, Tom Hendrikx wrote: > I have been playing around with the dane check tool from sys4 too, and > it seems it doesn't support the nice CNAME trick shown in > https://community.letsencrypt.org/t/please-avoid-3-0-1-and-3-0-2-dane-tlsa-records-with-le-certificates/7022
In the dane.sys4.de test code CNAMEs in TLSA records are supported and work, provided the target of the CNAME is in a signed zone of course. MX hosts that are CNAMEs are deliberately not supported as these violate the RFC requirements for MX records. For example: _25._tcp.gazonk.org. CNAME _tlsa.gazonk.org. _tlsa.gazonk.org. TLSA 3 1 1 2EE262031C03AD1143E557074DADCE1F681F1818D6B0DC59ED33F472 6B180B6C For which https://dane.sys4.de correctly shows (that this domain is misconfigured by promising and then not offering STARTTLS): 42 gazonk.org 212.247.24.42: STARTTLS not offered IP Addresses 212.247.24.42 Usable TLSA Records 3, 1, 1 2ee262031c03ad11[...]ed33f4726b180b6c -- Viktor.