Benutzer-Werkzeuge

Webseiten-Werkzeuge


pr:le-dns-dane

DANE records with Let's Encrypt

Problem

TLSA records announce what certificate is expected from an endpoint. Since the cert changes often, that can be tricky. One method re-uses the certificate key material so it doesn't change, but that's not very nice. We want to rotate the keys.

Setup

Instead of pinning the cert itself, use DANE-TA(2) to pin the currently active intermediate.

Compute the Intermediate TLSA RR

Find and download the currently used intermediate from LE's published Chain of Trust. Then compute its hash:

openssl x509 -in lets-encrypt-x3-cross-signed.pem -noout -pubkey |
  openssl rsa -pubin -outform DER | openssl dgst -sha256 -hex |
  awk '{print "le-ca TLSA 2 1 1", $NF}'

Next, publish that somewhere such as at the SOA level. Don't forget to put a comment on there and set a calendar reminder to check for the new one in time.

; Let's Encrypt R3 intermediate, expires: 15. September 2025 16:00:00 GMT
le-r3._dane     3600    IN      TLSA    2 1 1 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d

Finally, point all service records there:

_25._tcp.mx1.sys        IN      CNAME   le-r3._dane.example.com.
pr/le-dns-dane.txt · Zuletzt geändert: 2023/12/09 18:24 von martok