On 5/10/2021 12:38 PM, Tony Finch wrote:
Dan Egli <[email protected]> wrote:Still not working for me. The dig doesn't report anything, and I don't HAVE a keyfile since i'm using inline signing. Or does inline signing still require a key to be generated?Yes, you need to do your own key management with inline-signing using dnssec-keygen. The new dnssec-policy feature can do automatic key management for you.Tony.
So, I updated the settings. Now I have keyfiles generated by bind, as well as a binary .zone.signed in addition to the plain text .zone which has no DNSSEC information at all in it. I ran the signing routine and bind said it was signed good. So I obtained the DS and put in the registrar. Now I am getting SERVFAIL errors whenever I try to query my zone from another name server. Here's what I did:
#dig newideatest.site dnskey | dnssec-dsfromkey -2 -f - newideatest.site
newideatest.site. IN DS 49236 13 2 <LONG HASH>
Ok. Copy the long hash to the Registrar, plug it in. Check, done that.
# dig mx newideatest.site @8.8.4.4
; <<>> DiG 9.16.15 <<>> mx newideatest.site @8.8.4.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;newideatest.site. IN MX
;; Query time: 50 msec
;; SERVER: 8.8.4.4#53(8.8.4.4)
;; WHEN: Sat May 15 18:12:44 MDT 2021
;; MSG SIZE rcvd: 45
ServFail?! WHAT? So I go to DNSVIZ and run their test.
Errors (9)
* newideatest.site/A: No RRSIG covering the RRset was returned in the
response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56,
2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* newideatest.site/AAAA: No RRSIG covering the RRset was returned in
the response. (31.220.30.73, 45.77.29.133, 103.6.87.125,
119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* newideatest.site/DNSKEY (alg 13, id 49236): No RRSIG covering the
RRset was returned in the response. (31.220.30.73, 45.77.29.133,
103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3,
2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e,
2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
* newideatest.site/MX: No RRSIG covering the RRset was returned in the
response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56,
2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN,
UDP_-_EDNS0_512_D_KN)
* newideatest.site/NS: No RRSIG covering the RRset was returned in the
response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56,
2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* newideatest.site/SOA: No RRSIG covering the RRset was returned in
the response. (31.220.30.73, 45.77.29.133, 103.6.87.125,
119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, TCP_-_EDNS0_4096_D_N,
UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
* newideatest.site/TXT: No RRSIG covering the RRset was returned in
the response. (31.220.30.73, 45.77.29.133, 103.6.87.125,
119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* site to newideatest.site: No valid RRSIGs made by a key
corresponding to a DS RR were found covering the DNSKEY RRset,
resulting in no secure entry point (SEP) into the zone.
(31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56,
2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN,
UDP_-_EDNS0_512_D_KN)
* site to newideatest.site: The DS RRset for the zone included
algorithm 13 (ECDSAP256SHA256), but no DS RR matched a DNSKEY with
algorithm 13 that signs the zone's DNSKEY RRset. (31.220.30.73,
45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3,
2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e,
2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
Warnings (13)
* newideatest.site/A: The server responded with no OPT record, rather
than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125,
119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* newideatest.site/AAAA: The server responded with no OPT record,
rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133,
103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3,
2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e,
2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* newideatest.site/DNSKEY (alg 13, id 49236): The server responded
with no OPT record, rather than with RCODE FORMERR. (31.220.30.73,
45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3,
2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e,
2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
* newideatest.site/MX: The server responded with no OPT record, rather
than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125,
119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN,
UDP_-_EDNS0_512_D_KN)
* newideatest.site/NS: The server responded with no OPT record, rather
than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125,
119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5,
2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* newideatest.site/SOA: The server responded with no OPT record,
rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133,
103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3,
2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e,
2a04:bdc7:100:1b::3, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN,
UDP_-_EDNS0_4096_D_KN_0x20)
* newideatest.site/TXT: The server responded with no OPT record,
rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133,
103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3,
2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e,
2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
* site to newideatest.site: The following NS name(s) were found in the
authoritative NS RRset, but not in the delegation NS RRset (i.e., in
the site zone): jupiter.newideatest.site
* site to newideatest.site: The following NS name(s) were found in the
delegation NS RRset (i.e., in the site zone), but not in the
authoritative NS RRset: jupiter.eglifamily.name
* site/DS (alg 8, id 51676): DNSSEC specification prohibits signing
with DS records that use digest algorithm 1 (SHA-1).
* site/DS (alg 8, id 51676): DNSSEC specification prohibits signing
with DS records that use digest algorithm 1 (SHA-1).
* site/DS (alg 8, id 51676): DS records with digest type 1 (SHA-1) are
ignored when DS records with digest type 2 (SHA-256) exist in the
same RRset.
* site/DS (alg 8, id 51676): DS records with digest type 1 (SHA-1) are
ignored when DS records with digest type 2 (SHA-256) exist in the
same RRset.
So, what am I doing wrong? Here's the zone statement for the
newideatest.site zone in my named.conf:
zone "newideatest.site" {
type master;
file "pri/newideatest.zone";
allow-query { any; };
allow-transfer {
108.61.224.67; 116.203.6.3; 107.191.99.111;
185.22.172.112; 103.6.87.125; 192.184.93.99; 119.252.20.56;
31.220.30.73; 185.34.136.178; 185.136.176.247; 45.77.29.133;
116.203.0.64; 167.88.161.228; 199.195.249.208; 104.244.78.122;
2605:6400:30:fd6e::3; 2605:6400:10:65::3; 2605:6400:20:d5e::3;
2a01:4f8:1c0c:8122::3; 2001:19f0:7001:381::3; 2a06:fdc0:fade:2f7::1;
2a00:dcc7:d3ff:88b2::1; 2a04:bdc7:100:1b::3;
2401:1400:1:1201::1:7853:1a5; 2604:180:1:92a::3; 2403:2500:4000::f3e;
2a00:1838:20:2::cd5e:68e9; 2604:180:2:4cf::3; 2a01:4f8:1c0c:8115::3;
2001:19f0:6400:8642::3;
};
allow-update { trusted; };
key-directory "/var/bind/pri/keys";
inline-signing yes;
dnssec-policy default;
};
};
Help? If you have errors reaching me, try [email protected], as it
doesn't seem to be having issues.
--Dan Egli From my Test Server
OpenPGP_0x11B7451DF2015959.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
_______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list [email protected] https://lists.isc.org/mailman/listinfo/bind-users

