On Thu, May 23, 2013 at 12:21:02AM -0400, Paul Wouters wrote:

> On Wed, 22 May 2013, Viktor Dukhovni wrote:
> 
> >So this is a good time to deploy server TLSA records:
> >
> >   ; SHA256 digest of public key or full certificate.
> >   mail.example.com. IN TLSA 3 1 1 ...
> >   mail.example.com. IN TLSA 3 0 1 ...
> >
> >   ; Or SHA256 of issuing trust-anchor CA public key.  With the trust-anchor
> >   ; issuer certificate included in the server chain file!
> >   ;
> >   mail.example.com. IN TLSA 2 1 1 ...
> >   mail.example.com. IN TLSA 2 0 1 ...
> 
> Would these be better located at _25._tcp.mail.example.com ? :)

Responding as a matter of courtesy rather than necessity.  Yes, of
course!  Anyway, if anyone knows the sysadmins who operate mail.ietf.org,
please nudge them to enable STARTTLS and publish TLSA RRs.

The DNSSEC signature is already in place:

    $ drill -D -t mx ietf.org
    ;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 64505
    ;; flags: qr rd ra ad ; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 8
    ;; QUESTION SECTION:
    ;; ietf.org.    IN      MX

    ;; ANSWER SECTION:
    ietf.org.       1800    IN      MX      0 mail.ietf.org.
    ietf.org.       1800    IN      RRSIG   MX ...copious line noise...

https://xkcd.com/1181/

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to