Re: typo in script [was Re: OT - Dane, TLSA]

2014-04-25 Thread Viktor Dukhovni
On Fri, Apr 25, 2014 at 02:35:55PM +, Eray Aslan wrote: > For the record, looks like a typo in the script: > > --- tlsagen 2014-04-25 14:22:02.0 + > +++ tlsagen 2014-04-25 13:50:17.0 + Thanks, yes, this has since been fixed, and a few other improvements made. Cur

typo in script [was Re: OT - Dane, TLSA]

2014-04-25 Thread Eray Aslan
On Sat, Dec 14, 2013 at 06:30:15PM +, Viktor Dukhovni wrote: > Well, you're unlikely to have working TLSA RRs for your SMTP service > just by happenstance. If you want to create a TLSA RRset for your > SMTP server, run the attached "tlsagen" shell script as follows: > > $ tlsagen cert.pem

Re: OT - Dane, TLSA

2013-12-17 Thread /dev/rob0
On Sat, Dec 14, 2013 at 08:53:14PM +, Viktor Dukhovni wrote: > On Sat, Dec 14, 2013 at 02:35:15PM -0600, /dev/rob0 wrote: > > > > The trick is to find tools that make operating a DNSSEC zone > > > relatively painless. You get security, but it easier to mess > > > up leaving the zone with stal

Re: OT - Dane, TLSA

2013-12-14 Thread Benny Pedersen
John skrev den 2013-12-14 15:24: An excellent idea, particularly as you are talking to the dumbest bit of the horse at the moment. if its dumbest its a donkey, not a horse :)

Re: OT - Dane, TLSA

2013-12-14 Thread Viktor Dukhovni
On Sat, Dec 14, 2013 at 04:16:08PM -0500, John wrote: > Yes, unfortunately my .ca Registrar is not currently capable of > handling DS or DNSKEY records so I am using the ISC dlv, It works > for most things, but I assume from your comment that TLSA will > require records at the .ca root. I have the

Re: OT - Dane, TLSA

2013-12-14 Thread John
On 14/12/2013 1:30 PM, Viktor Dukhovni wrote: On Sat, Dec 14, 2013 at 12:44:49PM -0500, John Allen wrote: Just a thought, maybe there is a more appropriate forum/mail list to discuss this on, as this is not strictly Postfix related? It is fine to ask here, Postfix is the first real applicatio

Re: OT - Dane, TLSA

2013-12-14 Thread Viktor Dukhovni
On Sat, Dec 14, 2013 at 02:35:15PM -0600, /dev/rob0 wrote: > > The trick is to find tools that make operating a DNSSEC zone > > relatively painless. You get security, but it easier to mess > > up leaving the zone with stale signatures and thus essentially > > invisible to all DNSSEC-aware clients

Re: OT - Dane, TLSA

2013-12-14 Thread /dev/rob0
On Sat, Dec 14, 2013 at 05:26:01AM +, Viktor Dukhovni wrote: > On Sat, Dec 14, 2013 at 12:04:15AM -0500, John Allen wrote: > > > The main difficulty with server-side DANE is that your zone > > > must be DNSSEC signed. Deployment of DNSSEC is still fairly > > > thin. With a bit of luck DANE m

Re: OT - Dane, TLSA

2013-12-14 Thread Viktor Dukhovni
On Sat, Dec 14, 2013 at 12:44:49PM -0500, John Allen wrote: > >>Just a thought, maybe there is a more appropriate forum/mail list to > >>discuss this on, as this is not strictly Postfix related? > > > >It is fine to ask here, Postfix is the first real application to > >support DANE TLSA. > > Thank

Re: OT - Dane, TLSA

2013-12-14 Thread John Allen
On Sat, Dec 14, 2013 at 08:31:10AM -0500, John wrote: DANE TLSA records allow sites to independently create leaf and CA certificates after first registering their DNSSEC key-signing-keys with their DNS registrar. So in effect you do have a CA, but it is your DNS registrar and they effectively m

Re: OT - Dane, TLSA

2013-12-14 Thread Viktor Dukhovni
On Sat, Dec 14, 2013 at 08:31:10AM -0500, John wrote: > >DANE TLSA records allow sites to independently create leaf and CA > >certificates after first registering their DNSSEC key-signing-keys > >with their DNS registrar. So in effect you do have a CA, but it > >is your DNS registrar and they eff

Re: OT - Dane, TLSA

2013-12-14 Thread John
On 14/12/2013 8:37 AM, Wietse Venema wrote: . Does this do anything to solve "Man in the middle" who presents an apparently valid cert (usually generated on the fly)? Because I thought the only way to detect this was to compare the finger print of the key presented with the know finger print.

Re: OT - Dane, TLSA

2013-12-14 Thread Wietse Venema
John: > > - DNSSEC: a man-in-the-middle hardened means of publishing DNS data. > > > > - DANE: an IETF working group to develop standards for using DNSSEC > >to publish authentication information (public keys and the like) > >that binds DNS names to corresponding credentia

Re: OT - Dane, TLSA

2013-12-14 Thread John
On 14/12/2013 12:26 AM, Viktor Dukhovni wrote: On Sat, Dec 14, 2013 at 12:04:15AM -0500, John Allen wrote: The main difficulty with server-side DANE is that your zone must be DNSSEC signed. Deployment of DNSSEC is still fairly thin. With a bit of luck DANE might motivate folks

Re: OT - Dane, TLSA

2013-12-13 Thread Viktor Dukhovni
On Sat, Dec 14, 2013 at 12:04:15AM -0500, John Allen wrote: > > The main difficulty with server-side DANE is that your zone > > must be DNSSEC signed. Deployment of DNSSEC is still fairly thin. > > With a bit of luck DANE might motivate folks to consider DNSSEC. > > My interest in TLS

Re: OT - Dane, TLSA

2013-12-13 Thread John Allen
On 13/12/2013 3:50 PM, Viktor Dukhovni wrote: On Fri, Dec 13, 2013 at 03:11:38PM -0500, John Allen wrote: Does anybody know of a good,but simple write up on DANE and TLSA. It has to be simple enough for me to understand (assume idiot). An explanation of what DANE TLSA is for[*]? Or how to set

Re: OT - Dane, TLSA

2013-12-13 Thread Viktor Dukhovni
On Fri, Dec 13, 2013 at 03:11:38PM -0500, John Allen wrote: > Does anybody know of a good,but simple write up on DANE and TLSA. > It has to be simple enough for me to understand (assume idiot). An explanation of what DANE TLSA is for[*]? Or how to set up a Postfix to work with it? If the latter