martin f krafft wrote:
In fact, there are three options right now:

  a/ collect and deploy the fingerprints, as you say
  b/ use a self-signed certificate with life-time 99 years just for
     this purpose
  c/ use public key fingerprints instead of the cert fingerprints

I think (a) is really just ungood. I just implemented (c), which was
trivial and solves the problem. Thanks also to Daniel Kahn Gilmor
for the vital hint that made me realise Postfix 2.9 supports this.

Long-term, I think I might want to look into (b) though. I like the
idea of having a single certificate ("identity") of a host, that
then gets used in its various facets, but that's actually probably
not good security advice anyway.

Frankly I don't get why you prefer (b) over (a). If you enroll the LE certs in a central location then you already have the fingerprint and you don't have to collect them over an untrusted channel like for self-signed certs generated during OS installation (b). Well, you probably trust your SSH connection but right after OS deployment you have a hen-and-egg trust problem with SSH host key too.

Ciao, Michael.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to