-
-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DKIM key rotation #195
Comments
Let's close this for now as not planned. |
Reopening the issue. It seems to be feasible to rotate DKIM keys automatically by asking the admin to delegate This will actually simplify the setup for admins because copying DKIM key is usually difficult, especially if DNS provider has bad web UI for this. Debian has a |
Testing NSD on c1.testrun.org.
(have to explicitly specify that included file is for c1.testrun.org. as inside the OpenDKIM-generated file this is the expected origin while we only want to serve _domainkey.c1.testrun.org.)
(autogenerated, had to change permissions of /etc/dkimkeys to 755 and /etc/dkimkeys/dkim.txt to 644 so NSD can access it). With this configuration I also had to stop unbound because both nsd and unbound want to run on port 53. We will have to move unbound to another port like 5353 and point |
We cannot expect admins to rotate the key or change DNS records after setting up a server because, but there should be some way to do it. E.g. a command
cmdeploy dns
can always suggest to add next key and then if corresponding DKIM public key is already deployed make the server switch to it. Then just runningcmdeploy dns
from time to time and deploying DKIM records it suggests will rotate the keys at least eventually.For reference: https://www.m3aawg.org/DKIMKeyRotation
The text was updated successfully, but these errors were encountered: