I am trying to figure out how to make DANE work properly.
I enabled DNSSEC and DANE (TLSA) records for my domain and added it to my registrar.
it works.
DANE TLSA, when issuing a new certificate, comes up as invalid on various testing sites.
When restarting BIND, the values tend to validate after a short while. I dont know if this is a propagation issue or BIND needs to be restarted for the new TLSA values.
Other issue:
for every letsencrypt cert request it generates new 301 type records, and the old ones become invalid.
if I test my domain on internet.nl I get a message saying that I dont have a DANE rollover scheme in place.
There are some sites that explain records with 311 and 211 records which have the new key as well and that 301 is wrong for letsencrypt? I really dont have the knowledge or understanding.
To resolve your DANE and DNSSEC issues, consider using the --reuse-key option with Let’s Encrypt to keep the same private key during renewals, which helps maintain valid TLSA records. Also, switch from “3 0 1” TLSA records to a configuration that reuses keys, as recommended for Let’s Encrypt. This approach should reduce TLSA record changes and improve validation results.
Also Check this : learnmore-community.cloudflare.com/t/support-for-tlsa-dane-proto/9881?page=2
The impression I get is that as long as the private key is not changed when a 90 day LE certificate is reissued then a 3 1 1 DNS TLSA record DOES NOT NEED to be recreated, but a 3 0 1 or 3 0 2 DNS TLSA record DOES NEED to recreated.
So if the private key is changed the DNS TLSA record must be recreated. If the private key is not changed the the DNS TLSA record does not need to be changed if it is a 3 1 1 type.
With certbot, --reuse-key reuses the private key. It is possible Virtualmin already does this.
I don’t know what the command and parameters are to generate a TLSA DNS record. I assume it simple.
There have been lenghty discussions in Virtualmin Github issues. Reopening looks like a waste of time.
I checked LE settings for private key reuse (yes) and note --reuse-key is being entered in logs.
Someone needs to find specific lines in source code and request they be changed because changing them fixed the problem for them. I will have a look myself
I have proposed a three line fix in a new Virtualmin Github issue at
I have since added information to the issue which explains why LE (Let’s Encrypt) appears to involved in a protocol (TLSA DNS) that is supposed to be independent of LE. The record generation process can be made completely independent and I provide an example of this.