In this post, we keep a list of deSEC-aware software that we have knowledge of.
Note: This does not imply any endorsement by deSEC. We also do not evaluate whether the tools listed here implement sensible security measures, nor do we know whether these programs hold what they promise. The list is merely meant as an inspiration for digging deeper into the deSEC ecosystem.
The repository is marked as archived and the project is in readonly mode. Looks like PyPI releases have all been yanked too. This should be marked as unmaintained or abandoned.
I’m excited to share with you a small script I’ve developed to simplify the process of updating TLSA records from Plesk. You can find the script on GitHub at this link: Plesk-DANE-TLSA-and-deSEC
TLSA records are an essential part of ensuring secure communication over the internet, particularly for services like email and web servers. However, managing these records manually can be cumbersome, especially for those using Plesk as their hosting control panel.
With this script, I aimed to streamline the process, allowing Plesk users to update their TLSA records seamlessly. By integrating with deSEC DNS service, the script automates the update process, saving time and effort for administrators.
I encourage you to check out the script on GitHub, where you can find detailed instructions on how to use it and contribute to its development. Whether you’re a Plesk user looking to enhance your server’s security or a developer interested in improving the script, your feedback and contributions are highly appreciated.
Thank you for your support, and I hope you find the script useful!
I like to keep my domain definitions in zone files (which are pretty standard). This lets my use the zone file as source of truth and writes to deSEC any changes.
Currently it won’t delete records that are removed from the zone file. I might add a --prune flag to do this in future.
Are there any tools who fully implement a TLSA rollover by using a current+next private key? Most implementation seem to ‘just’ publish a single TLSA record without providing a current-next rollover as suggested (see https://imrryr.org/~viktor/ICANN61-viktor.pdf, slides 20+21). A single TLSA record would mean possible downtime when renewing certificates.
Not exactly what you are looking for and somewhat more complex, but there is this:
This provides certificate renewal and TLSA key rollover as an application for MicroVMs. It shouldn’t be too hard to port this to a more traditional environment if you don’t like MicroVMs.