I don't see how that is valid at all. It can be used as a hint, but not a hard rule.

I publish 3 records, past certificate that is rotated out, current, and the next certificate I will roll in. You should be publishing your standby/failover certificate, if you want to handle a compromised certificate case.



Quoting John <[email protected]>:

Are the following assumptions reasonable?

if there are multiple TLSA dane-ee (type 3) records for a particular service, none of which match the current generated record, they can (maybe should) be deleted.

The same "rule" can be could be applied to dane type 2 records.



Reply via email to