Skip to content

--always-force-new-domain-key should pre-generate the future domain key pair #3096

@Delicates

Description

@Delicates

--always-force-new-domain-key should pre-generate the future (next) domain key pair after the new certificate is provisioned, so that --reloadcmd can update TLSA records in advance of obtaining future certificates as part of the Current + Next DANE roll-over procedure.
Pre-generated keys (if they exist) should be used for all future --always-force-new-domain-key certificate provisioning.

Key rotation requires future planning for DANE TLSA roll-over to account for DNS propagation delays and TLSA records TTL.

See slides 20-21 from the 2018 ICANN61 presentation by Viktor Dukhovni.

The Current + Next DANE roll-over procedure is:

  • Generate next key when deploying current key and cert
  • Deploy new chain, and publish new TLSA records:
    _25._tcp.mx.example.com. IN TLSA 3 1 1 curr-pubkey-sha256
    _25._tcp.mx.example.com. IN TLSA 3 1 1 next-pubkey-sha256
  • Weeks later, obtain certificate for pre-generated next key
  • But first, make sure TLSA record is already in place
  • Repeat!

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions