On Wed, Aug 18, 2021 at 02:32:51PM +1000, raf <post...@raf.org> wrote:

> I guess the most pragmatic thing to do would be to only use DANE/TLSA
> for port 25 with self-signed certificates with self-automated rollovers,
> and use certbot-created certificates (without corresponding TLSA records)
> for everything else. But I'd like to eventually be able to publish TLSA
> records for all the ports (25/443/465/587/993/995). But that's hardly
> urgent. It can wait for danebot. Let me know when it's ready for testing.

I couldn't help it. I got excited and wrote a shell script called danectl
to provide a DANE-friendly Certbot workflow. It has subcommands to do:

 - create a pair of certificates with stable keys: current and next
 - tell it what TLSA records you'll be wanting (port/protocol/host)
 - print current/next TLSA RRs for you to publish to the DNS
 - check that all the TLSA RRs are published
 - tell it what services to reload on a key rollover
 - rollover (then create a new next key and print its TLSA RRs)

It's made it very easy for me to DANE all the things.
I still update my zonefiles manually, which I prefer,
but it's just copy and paste. I could automate it.

I'm sure it's very inflexible and limited but it's
just what I wanted: TLSA 3 1 1 only, multiple domains,
configurable TLSA prefixes and services to reload,
cronnable rollovers and monitoring, potentially
automatable DNS updates, and simple commands.

https://raf.org/danectl
https://raf.org/danectl/manpages/danectl.1.html
https://github.com/raforg/danectl

cheers,
raf

Reply via email to