Adding DNS (TLSA - Record) and match against SMTP-server public fingerprint #5705
Labels
A:monitor
Issues or PRs related to monitors
feature-request
Request for new features to be added
type:enhance-existing
feature wants to enhance existing monitor
📑 I have found these related issues/pull requests
I realized that many smal and medium sized companies do not support DANE for their mailservers.
In fact the privacy of mail communication contains a lot of sensitive information, they are partly still vulnerable through man-in-the-middle 'downgrade attack'.
🏷️ Feature Request Type
New monitor
🔖 Feature description
Often I heard that they can not reliably monitor "DANE" and validate the TLSA DNS-record against the public-fingerprint of the SMTP servers certificate. Since some are using letsencrypt and are afraid to miss the renewal..without pinning the csr/key.
Since I love your lightweight smoth running uptime-kuma, I would suggest to expand it if possible with that feature.
I think it would already be sufficient just to enter the expected value of the TLSA record and check against openssl for the verification lines.
✔️ Solution
Example how to check it through dig:
And gathering the Information with:
Result:
❓ Alternatives
No response
📝 Additional Context
No response
The text was updated successfully, but these errors were encountered: