Re: Today is a good day to DANE!

2021-08-25 Thread raf
On Wed, Aug 18, 2021 at 02:32:51PM +1000, raf wrote: > I guess the most pragmatic thing to do would be to only use DANE/TLSA > for port 25 with self-signed certificates with self-automated rollovers, > and use certbot-created certificates (without corresponding TLSA records) > for everything

Re: Today is a good day to DANE!

2021-08-24 Thread Matt Corallo
On 8/24/21 19:23, Viktor Dukhovni wrote: On 24 Aug 2021, at 7:58 pm, Matt Corallo wrote: May be worth mentioning here that, sadly, Postfix does not support MTA-STS currently. The one implementation at https://github.com/Snawoot/postfix-mta-sts-resolver/ will reduce security rather than

Re: Today is a good day to DANE!

2021-08-24 Thread Viktor Dukhovni
> On 24 Aug 2021, at 7:58 pm, Matt Corallo wrote: > > May be worth mentioning here that, sadly, Postfix does not support MTA-STS > currently. > > The one implementation at > https://github.com/Snawoot/postfix-mta-sts-resolver/ will reduce security > rather than increase it as

Re: Today is a good day to DANE!

2021-08-24 Thread Matt Corallo
On 8/18/21 21:44, raf wrote: They are into MTA-STS instead, as a way to prevent downgrade attacks against mail servers. SMTP MTA Strict Transport Security (MTA-STS) https://tools.ietf.org/html/rfc8461 (Proposed Standard) But that's all it does (assuming other mail servers are paying

Re: Today is a good day to DANE!

2021-08-21 Thread Michael Grimm
On 21. Aug 2021, at 01:57, Viktor Dukhovni wrote: >> On 20 Aug 2021, at 4:59 pm, Michael Grimm wrote: >> All of my domains are signed by KSK(13) and ZSK(13) and I do still rotate my >> ZSK's every 90 days after my migration from DSA keys. If I do understand you >> correctly, I could modify my

Re: Today is a good day to DANE!

2021-08-20 Thread Viktor Dukhovni
> On 20 Aug 2021, at 4:59 pm, Michael Grimm wrote: > > Thanks for that information I didn't think about before. > > All of my domains are signed by KSK(13) and ZSK(13) and I do still rotate my > ZSK's every 90 days after my migration from DSA keys. If I do understand you > correctly, I could

Re: Today is a good day to DANE!

2021-08-20 Thread Michael Grimm
Viktor Dukhovni wrote: > With ECDSA P256(13) as the DNSKEY (signature) algorithm, the incentive > to rotate keys frequently (~90 days) is substantially lower, as the keys > are strong enough to resist cryptographic attacks for years. The only > practical risk is key disclosure. Thanks for that

Re: Today is a good day to DANE!

2021-08-19 Thread raf
On Thu, Aug 19, 2021 at 01:11:37AM -0400, Viktor Dukhovni wrote: > On Thu, Aug 19, 2021 at 02:44:44PM +1000, raf wrote: > > > I just saw Viktor's reply about mx[1-4].smtp.goog, > > and it looks like those domains are no longer signed: > > > > > host -t ds mx1.smtp.goog > > mx1.smtp.goog

Re: Today is a good day to DANE!

2021-08-18 Thread Viktor Dukhovni
On Thu, Aug 19, 2021 at 02:44:44PM +1000, raf wrote: > > Is google / gmail using it yet? > > Last i knew they weren't using DNSSEC or DANE. > > Nope. Actually, yes to some extent. See my more detailed response. > But it's still a very small percentage overall. I'm tracking ~15.8 million

Re: Today is a good day to DANE!

2021-08-18 Thread raf
On Wed, Aug 18, 2021 at 10:03:06PM -0400, post...@ptld.com wrote: > > The adoption of DNSSEC seems to have increased a lot in > > the past 12 months (~30% increase). > > Is google / gmail using it yet? > Last i knew they weren't using DNSSEC or DANE. Nope. > host -t ds google.com

Re: Today is a good day to DANE!

2021-08-18 Thread Viktor Dukhovni
On Wed, Aug 18, 2021 at 10:03:06PM -0400, post...@ptld.com wrote: > > The adoption of DNSSEC seems to have increased a lot in > > the past 12 months (~30% increase). > > Is google / gmail using it yet? There are 4 GMail MX hosts that are not publicised by Google, but are DNSSEC signed:

Re: Today is a good day to DANE!

2021-08-18 Thread raf
On Wed, Aug 18, 2021 at 11:04:10AM +0200, Marcel de Riedmatten wrote: > Le mercredi 18 août 2021 à 17:45 +1000, raf a écrit : > > > > I'll need to find out how to replace one certificate > > with the other as well. > > Keep in mind that both certificates will have a different path. It goes >

Re: Today is a good day to DANE!

2021-08-18 Thread postfix
The adoption of DNSSEC seems to have increased a lot in the past 12 months (~30% increase). Is google / gmail using it yet? Last i knew they weren't using DNSSEC or DANE.

Re: Today is a good day to DANE!

2021-08-18 Thread raf
On Wed, Aug 18, 2021 at 09:52:38PM +0200, Ralph Seichter wrote: > * raf: > > > If you don't mind having a key that lasts "forever", you only > > need one(!) extra line in Bind's zone config, and one(!) manual > > interaction with your domain registrar. > > Well, sort of. As per default

Re: Today is a good day to DANE!

2021-08-18 Thread Viktor Dukhovni
> On 18 Aug 2021, at 4:35 pm, Ralph Seichter wrote: > > I still use RSA keys (algorithm 8). My main point is that I find it more > convenient to only roll ZSK, and to only place KSK data into the parent > zone. The latter requires me to ask my hosting provider to manually > update key material

Re: Today is a good day to DANE!

2021-08-18 Thread Ralph Seichter
* Viktor Dukhovni: > With ECDSA P256(13) as the DNSKEY (signature) algorithm, the incentive > to rotate keys frequently (~90 days) is substantially lower [...] I still use RSA keys (algorithm 8). My main point is that I find it more convenient to only roll ZSK, and to only place KSK data into

Re: Today is a good day to DANE!

2021-08-18 Thread Viktor Dukhovni
> On 18 Aug 2021, at 3:52 pm, Ralph Seichter wrote: > > Well, sort of. As per default settings, BIND does not appear to create a > key signing key (KSK) / zone signing key (ZSK) pair, but instead one > single key to sign each zone. That's sufficient from a technical > perspective, but whenever

Re: Today is a good day to DANE!

2021-08-18 Thread Ralph Seichter
* raf: > If you don't mind having a key that lasts "forever", you only need > one(!) extra line in Bind's zone config, and one(!) manual interaction > with your domain registrar. Well, sort of. As per default settings, BIND does not appear to create a key signing key (KSK) / zone signing key

Re: Today is a good day to DANE!

2021-08-18 Thread Marcel de Riedmatten
Le mercredi 18 août 2021 à 17:45 +1000, raf a écrit : > > I'll need to find out how to replace one certificate > with the other as well. Keep in mind that both certificates will have a different path. It goes so: 1) create the new certificate 2) add a TLSA record to the zone for the new key

Re: Today is a good day to DANE!

2021-08-18 Thread raf
On Wed, Aug 18, 2021 at 08:53:40AM +0200, Marcel de Riedmatten wrote: > Le mercredi 18 août 2021 à 14:32 +1000, raf a écrit : > > > > It would be great if certbot supported multiple simultaneous > > certificates > > for a domain, so that the next certificate could be ready in advance. > > Then

Re: Today is a good day to DANE!

2021-08-18 Thread Marcel de Riedmatten
Le mercredi 18 août 2021 à 14:32 +1000, raf a écrit : > > It would be great if certbot supported multiple simultaneous > certificates > for a domain, so that the next certificate could be ready in advance. > Then pre/post/deploy hooks could take care of everything fairly > easily. > But I might

Re: Today is a good day to DANE!

2021-08-17 Thread raf
On Tue, Aug 17, 2021 at 12:35:40PM -0400, Viktor Dukhovni wrote: > On Tue, Aug 17, 2021 at 06:12:04PM +1000, raf wrote: > > > If you use Debian stable, and ISC Bind, it has just > > become really really easy to implement DNSSEC for your > > domain(s). > > Indeed, BIND 9.16 makes it

Re: Today is a good day to DANE!

2021-08-17 Thread Viktor Dukhovni
On Tue, Aug 17, 2021 at 06:12:04PM +1000, raf wrote: > If you use Debian stable, and ISC Bind, it has just > become really really easy to implement DNSSEC for your > domain(s). Indeed, BIND 9.16 makes it dramatically easier to sign your DNS zone and keep it signed reliably. It automates ZSK

Today is a good day to DANE!

2021-08-17 Thread raf
Hi, If you'd like to point DANE at your postfix server, today might be a good day to look into it. If not, please ignore the rest of this post. And apologies if this is all old news to you. If you use Debian stable, and ISC Bind, it has just become really really easy to implement DNSSEC for your