Hello Mirsad,

You changed to dnssec-policy with different key algorithms than you used for manual signing:

Jun 1 21:46:06 domac named[46537]: keymgr: retire DNSKEY alu.hr/RSASHA256/46119 (ZSK) Jun 1 21:46:06 domac named[46537]: keymgr: retire DNSKEY alu.hr/RSASHA256/34042 (KSK) Jun 1 21:46:06 domac named[46537]: keymgr: DNSKEY alu.hr/ECDSAP256SHA256/43987 (KSK) created for policy standard Jun 1 21:46:06 domac named[46537]: keymgr: DNSKEY alu.hr/ECDSAP256SHA256/3502 (ZSK) created for policy standard

You had RSHSHA256 DNSSEC keys, but you started using a DNSSEC policy with ECDSAP256SHA256 keys.

Since the existing keys do not match the policy, BIND started a key rollover.

See https://kb.isc.org/docs/dnssec-key-and-signing-policy for more information about migration to dnssec-policy.

Also changing from directory and file "/etc/bind/zones/alu.hr.db.signed" to file "/var/cache/bind/alu.hr.db" may be causing some problems.

There also seems to be a permission problem:

Jun 1 22:03:38 domac named[46537]: dns_dnssec_keylistfromrdataset: error reading /var/cache/bind/keys/Kalu.hr.+013+03502.private: file not found Jun 1 22:03:38 domac named[46537]: dns_dnssec_keylistfromrdataset: error reading /var/cache/bind/keys/Kalu.hr.+013+43987.private: file not found

Hope these pointers help.

- Matthijs



On 01-06-2022 23:14, Mirsad Goran Todorovac wrote:
Dear All,

I have tried to switch from manually signed DNSSEC zone to dnssec-policy "standard", and BIND9 server started
behaving odd. Here is the manual signing conf:

include "/etc/bind/keys/domac.alu.hr-tsig.key";

zone "alu.hr" in {
         type master;
         file "/etc/bind/zones/alu.hr.db.signed";
         allow-transfer { key domac.alu.hr-key; 161.53.2.70; };
         also-notify { 31.147.205.54; 161.53.2.70; };
         forwarders {};
};

... and the automatic signing conf:

zone "alu.hr" in {
         type master;
         file "/var/cache/bind/alu.hr.db";
         allow-transfer { key domac.alu.hr-key; 161.53.2.70; };
         also-notify { 31.147.205.54; 161.53.2.70; };
         dnssec-policy "standard";
         forwarders {};
};

There was a symbolic link /var/cache/bind/alu.hr.db -> /etc/bind/zones/alu.hr.db .

The logfile is too long to post, so I will add link: https://domac.alu.hr/~mtodorov/tmp/named-20220601.log

NOTE: Fun starts when I tried to automatically sing zone in zonefile /etc/bind/zones/alu.hr.db, and APPARMOR denied opening file to BIND. Maybe that confused the good old BIND9 server?

Then I added link in /var/cache/bind, as for DDNS zones.

The the zone appeared signed, but with only NSEC records, no RRSIGs, with this in log:

Jun  1 21:52:42 domac named[46537]: scheduled loading new zones
Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (unsigned): loaded serial 2022060101 Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): loaded serial 2022060101 Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): receive_secure_serial: unchanged Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): sending notifies (serial 2022060101) Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): reconfiguring zone keys Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): zone_rekey:dns_zone_getdnsseckeys failed: not found Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: keymgr: retire DNSKEY alu.hr/RSASHA256/46119 (ZSK) Jun  1 21:52:42 domac named[46537]: keymgr: retire DNSKEY alu.hr/RSASHA256/34042 (KSK) Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: Fetching alu.hr/ECDSAP256SHA256/3502 (ZSK) from key repository. Jun  1 21:52:42 domac named[46537]: DNSKEY alu.hr/ECDSAP256SHA256/3502 (ZSK) is now published Jun  1 21:52:42 domac named[46537]: DNSKEY alu.hr/ECDSAP256SHA256/3502 (ZSK) is now active Jun  1 21:52:42 domac named[46537]: Fetching alu.hr/ECDSAP256SHA256/43987 (KSK) from key repository. Jun  1 21:52:42 domac named[46537]: DNSKEY alu.hr/ECDSAP256SHA256/43987 (KSK) is now published Jun  1 21:52:42 domac named[46537]: DNSKEY alu.hr/ECDSAP256SHA256/43987 (KSK) is now active Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): next key event: 01-Jun-2022 23:46:06.043 Jun  1 21:52:42 domac named[46537]: any newly configured zones are now loaded
Jun  1 21:52:42 domac named[46537]: running
Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort Jun  1 21:52:42 domac named[46537]: zone alu.hr/IN (signed): attempt to lock key files, but no key file lock available, abort

I couldn't Google out any such message.

However, the BIND server started acting like a runaway, displying lines like this in the log:

Jun  1 22:06:55 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:55 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating hr/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating hr/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating hr/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating arpa/DS: no valid signature found Jun  1 22:06:56 domac named[43715]: validating ./NS: no valid signature found

... and at very fast rate, so I reverted to the manually signed conf.

Any idea how could I still apply dnssec-policy? Manual signing works, but it is tedious, and easy to forget to sign ...

For other subzones, mainly slava.alu.hr, conversion from manually signed RSA keys to automatically signed DNSSEC standard policy worked out-of-the-box.

HERE is the policy (from DNSSEC manual):

dnssec-policy standard {
     dnskey-ttl 600;
     keys {
         ksk lifetime 365d algorithm ecdsap256sha256;
         zsk lifetime 60d algorithm ecdsap256sha256;
     };
     max-zone-ttl 600;
     parent-ds-ttl 600;
     parent-propagation-delay 2h;
     publish-safety 7d;
     retire-safety 7d;
     signatures-refresh 5d;
     signatures-validity 15d;
     signatures-validity-dnskey 15d;
     zone-propagation-delay 2h;
};

Thanks for any idea how to get out of this.

Hope this helps.

Kind regards,
Mirsad

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to