====== DANE records with Let's Encrypt ======
===== Problem =====
TLSA records announce what certificate is expected from an endpoint. Since the cert changes often, that can be tricky. One method re-uses the certificate key material so it doesn't change, but that's not very nice. We //want// to rotate the keys.
===== Setup =====
Instead of pinning the cert itself, use DANE-TA(2) to pin the currently active intermediate.
==== Compute the Intermediate TLSA RR ====
Find and download the currently used intermediate from LE's published [[https://letsencrypt.org/certificates/|Chain of Trust]]. Then compute its hash:
openssl x509 -in lets-encrypt-x3-cross-signed.pem -noout -pubkey |
openssl rsa -pubin -outform DER | openssl dgst -sha256 -hex |
awk '{print "le-ca TLSA 2 1 1", $NF}'
Next, publish that somewhere such as at the SOA level. Don't forget to put a comment on there and set a calendar reminder to check for the new one in time.
; Let's Encrypt R3 intermediate, expires: 15. September 2025 16:00:00 GMT
le-r3._dane 3600 IN TLSA 2 1 1 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
Finally, point all service records there:
_25._tcp.mx1.sys IN CNAME le-r3._dane.example.com.