Viktor Dukhovni via Postfix-users <postfix-users@postfix.org> writes:

> On Thu, May 18, 2023 at 09:22:34PM +0900, Byung-Hee HWANG via Postfix-users
> wrote:
>
>> And now i added TLSA record for only *outbond* smtp server,
>> <yw-1204.doraji.xyz>.
>
> It is also your secondary MX host:
>
>     https://stats.dnssec-tools.org/explore/?doraji.xyz
>
> the primary MX host does not yet have TLSA records.  The detailed
> status is:
>
>     doraji.xyz. IN MX 1871 yw-0919.doraji.xyz.
>     doraji.xyz. IN MX 1895 yw-1204.doraji.xyz.
>     _25._tcp.yw-0919.doraji.xyz. IN TLSA ? ; NXDOMAIN
>     _25._tcp.yw-1204.doraji.xyz. IN TLSA 3 1 1 
> b4b06c36727808cb3e272f438cc6f1a77ee370c50dfb24eb5774a6113e4c6c0f
>       yw-1204.doraji.xyz[185.17.255.72]: pass: TLSA match: depth = 0, name = 
> yw-1204.doraji.xyz
>         TLS = TLS13 with AES256GCM-SHA384,X25519,PubKeyALG_RSA
>         name = yw-1204.doraji.xyz
>         depth = 0
>           Issuer CommonName = R3
>           Issuer Organization = Let's Encrypt
>           notBefore = 2023-03-20T06:03:54Z
>           notAfter = 2023-06-18T06:03:53Z
>           Subject CommonName = yw-1204.doraji.xyz
>           pkey sha256 [matched] <- 3 1 1 
> b4b06c36727808cb3e272f438cc6f1a77ee370c50dfb24eb5774a6113e4c6c0f
>         depth = 1
>           Issuer CommonName = ISRG Root X1
>           Issuer Organization = Internet Security Research Group
>           notBefore = 2020-09-04T00:00:00Z
>           notAfter = 2025-09-15T16:00:00Z
>           Subject CommonName = R3
>           Subject Organization = Let's Encrypt
>           pkey sha256 [nomatch] <- 2 1 1 
> 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
>         depth = 2
>           Issuer CommonName = DST Root CA X3
>           Issuer Organization = Digital Signature Trust Co.
>           notBefore = 2021-01-20T19:14:03Z
>           notAfter = 2024-09-30T18:14:03Z
>           Subject CommonName = ISRG Root X1
>           Subject Organization = Internet Security Research Group
>           pkey sha256 [nomatch] <- 2 1 1 
> 0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
>       yw-1204.doraji.xyz[2a03:ebc0:5000:12::10]: pass: TLSA match: depth = 0, 
> name = yw-1204.doraji.xyz
>         TLS = TLS13 with AES256GCM-SHA384,X25519,PubKeyALG_RSA
>         name = yw-1204.doraji.xyz
>         depth = 0
>           Issuer CommonName = R3
>           Issuer Organization = Let's Encrypt
>           notBefore = 2023-03-20T06:03:54Z
>           notAfter = 2023-06-18T06:03:53Z
>           Subject CommonName = yw-1204.doraji.xyz
>           pkey sha256 [matched] <- 3 1 1 
> b4b06c36727808cb3e272f438cc6f1a77ee370c50dfb24eb5774a6113e4c6c0f
>         depth = 1
>           Issuer CommonName = ISRG Root X1
>           Issuer Organization = Internet Security Research Group
>           notBefore = 2020-09-04T00:00:00Z
>           notAfter = 2025-09-15T16:00:00Z
>           Subject CommonName = R3
>           Subject Organization = Let's Encrypt
>           pkey sha256 [nomatch] <- 2 1 1 
> 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
>         depth = 2
>           Issuer CommonName = DST Root CA X3
>           Issuer Organization = Digital Signature Trust Co.
>           notBefore = 2021-01-20T19:14:03Z
>           notAfter = 2024-09-30T18:14:03Z
>           Subject CommonName = ISRG Root X1
>           Subject Organization = Internet Security Research Group
>           pkey sha256 [nomatch] <- 2 1 1 
> 0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
>     
> Since your certificate is from Let's Encrypt, you've probably configured
> automatic renewal.  If you haven't also implemented *monitoring* of your
> DANE TLSA configuration that checks whether the TLSA records match the
> certificate chain, you should do that immediately, and ideally before
> publishing TLSA records for any servers carrying "non-test" traffic.
>
> You can publish TLSA records for some test host with a self-signed
> cert, and check monitoring detects incorrect TLSA records when
> mismatched TLSA records are configured (and is not complaining
> when the TLSA records are correct).
>
> You then also need to make sure that your certificate rollover process
> is robust, and either keeps the public key unchanged, or you pre-publish
> matching TLSA records for future keys alongside current keys.
>
> Setting up inbound DANE requires operational diligence.  Do consider
> implemting DANE, but not as a fashion statement, rather only because
> you understand how to coordinate certificate management with DANE
> TLSA record upkeep.

Thanks for advice!

>        [renewalparams]
>        reuse_key = True
>        preferred_chain = ISRG Root X1
>        ...

Thanks again too! I did updated conf file with
reuse_key/preferred_chain things.


And
I can't say anything yet. I need some test for long time. If i am sure
what DANE is, i will setup inbond server (yw-0919.doraji.xyz) with DANE.


Sincerely, Byung-Hee

-- 
^고맙습니다 _布德天下_ 감사합니다_^))//
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to