> On Apr 25, 2017, at 4:59 PM, G. Schlisio <[email protected]> wrote:
> 
>> It is also possible to avoid DANE TLSA changes while rolling over
>> Let's Encrypt keys:
>> 
>>   
>> http://postfix.1071664.n5.nabble.com/WoSign-StartCom-CA-in-the-news-td86436.html#a86444
>>   https://community.letsencrypt.org/t/new-certbot-client-and-csr-option/15766
>>   
>> https://www.internetsociety.org/deploy360/blog/2016/03/lets-encrypt-certificates-for-mail-servers-and-dane-part-2-of-2/
>>   
>> https://community.letsencrypt.org/t/please-avoid-3-0-1-and-3-0-2-dane-tlsa-records-with-le-certificates/7022
>> 
> 
> Thank you for your hints and sorry for the late followup. busy and stuff.
> thank you for your suggestions, I was aware of the csr-option but wanted
> to avoid this, since it does not well automate with certbot.

Sine "--csr" is a certbot option I am surprised to hear you say that
"it does not automate well".  My expectation is that this is fairly
easy to automate.  Just generate the CSR from a fixed private key,
and use it instead of having certbot generate a new key and the
corresponding CSR.  Perhaps you need help running "openssl req"
in non-interactive batch scripts?

> I came up with another idea, which is pinning the intermediate
> certificate with a 2 1 1 TLSA entry.

That's exactly what I recommend to LE users.

> Even though this is not totally correct (2 means private CA, which is
> not true in this case) it seemed to work.

Actually it is completely correct.  Usage DANE-TA(2) just lifts the
requirement of pre-existing client trust of the designated CA.  It
is completely valid for the CA in question to also be a public CA
trusted by some clients.

> Do you see any issues with doing this?

None, provided you trust Let's Encrypt to be your CA and to not
issue certificates for your domain to the wrong party.

-- 
        Viktor.

Reply via email to