We run a private CA and employ both DNSSEC and DANE. Recently we decided to reissue our CA root and issuer keys as these were generated at 1024 bits when our PKI was set up in 2008. Our original TLSA RR pointed to the issuing CA as the trust anchor. However re-reading the RFCs and various DANE related commentary raises the question of whether the ROOT public key should be used instead.
We are presently trialling this idea parallel to our existing DANE records. When we use https://dane.sys4.de/smtp/ to validate then our existing server key checks out, but the new ROOT TLSA record is also reported even though we have not switched the server key over to the new certificate chain. Further, the new trust anchor TLSA RR is reported thus:
Usable TLSA Records
2, 1, 2 c26e0ec16a46a973[...]ce60eabc5adba90e - self signed certificate in certificate chain: (19)
Whereas the current TLSA RR for the same host is reported this way:
2, 0, 2 67274b3554289058[...]5fd3917510e6722a
The first record reported refers to the new Root CA. The second refers to the original Issuing CA (signed by the original Root CA).
When I check for the message self signed certificate in certificate chain: (19)
the impression I form is that this is an error. However, if it is an error then exactly where does the CA Root public key fit into the DANE scheme?