mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
Adding DNS (TLSA - Record) and match against SMTP-server public fingerprint #4040
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#4040
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @DRieper on GitHub (Mar 17, 2025).
📑 I have found these related issues/pull requests
I realized that many smal and medium sized companies do not support DANE for their mailservers.
In fact the privacy of mail communication contains a lot of sensitive information, they are partly still vulnerable through man-in-the-middle 'downgrade attack'.
🏷️ Feature Request Type
New monitor
🔖 Feature description
Often I heard that they can not reliably monitor "DANE" and validate the TLSA DNS-record against the public-fingerprint of the SMTP servers certificate. Since some are using letsencrypt and are afraid to miss the renewal..without pinning the csr/key.
Since I love your lightweight smoth running uptime-kuma, I would suggest to expand it if possible with that feature.
I think it would already be sufficient just to enter the expected value of the TLSA record and check against openssl for the verification lines.
✔️ Solution
Example how to check it through dig:
And gathering the Information with:
Result:
❓ Alternatives
No response
📝 Additional Context
No response
@CommanderStorm commented on GitHub (Mar 24, 2025):
I have no idea who/what dane is, but we would love a PR assuming this is in the DNS spec.
The dns monitor is defined here:
For things like this, I would expect a testcase as well to ensure that we don't regress.