On Sep 21, 2020, at 4:22 AM, Viktor Dukhovni ietf-dane@dukhovni.org wrote:
Please note that the Let's Encrypt intermediate CA certificate "X3" will soon be phased out in favour of "R3" and "E1" which have new keys, and so any DANE TLSA "2 1 1" records matching "X3" will not match "R3" or "E1".
This has now happened. New Let's Encrypt certificates are being issued via "R3" and "X3" has been retired:
http://dnssec-stats.ant.isi.edu/~viktor/x3hosts.html https://letsencrypt.org/certificates/#intermediate-certificates
Over the next 60-90 days the remaining not yet expired or renewed certificate chains issued by "X3" are still will age out, at which point no one will need to include the "X3" or "X4" hashes in their TLSA records.
If your TLSA records still include only "X3", the current renewal cycle is your last opportunity to add the hashes "R3", "R4", "E1" and "E2" to your your TLSA RRset. The extant "X3" hash can be removed once a new certificate issued by one of the new CAs is deployed.
Over the last few days the DANE survey has started reporting a handful of new failures each day that resulted from a new "R3" certificate for an MX host whose TLSA RRset included only the "X3" hash. Please save yourself and me the trouble of dealing with this only after an initial outage.
Also as explained in:
http://dnssec-stats.ant.isi.edu/~viktor/x3hosts.html
Please avoid issuer TLSA records with selector Cert(0), i.e. "2 0 1" and "2 0 2". These are much more fragile, and worse, "R3" and "R4" are cross-signed by two different issuers, so there are two differnt full cert hashes for R3 and R4, but just one underlying public key and corresponding "2 1 1" hash.
DO NOT use "2 0 1" or "2 0 2" records. The best choice is "2 1 1".