On 19. 03. 26 10:18, Matthijs Mekking wrote:
On 3/18/26 13:11, Nagesh Thati wrote:
I wanted to follow up on my earlier question regarding using dnssec- policy with externally generated keys in BIND 9.18.35 and share that the suggested approach worked successfully.

To summarize what worked for our implementation:

1. Using the -G flag with dnssec-keygen to generate pregenerated keys with no timing metadata (only the Created field is present). This was the key insight we were missing — our keys previously had full timing metadata which caused BIND's KASP engine to mishandle them.

Sounds good.


2. Copying the pregenerated keys to the key directory and running 'rndc loadkeys' is sufficient for BIND to detect and schedule the rollover automatically. There is no need to run 'rndc dnssec - rollover' for normal lifecycle rollovers — doing so prematurely caused immediate key deletion in our testing, bypassing the double-signature phase entirely.

Correct. Only if you have key lifetime unlimited, you will need to run 'rndc dnssec -rollover'. Some operators like to control when they start rolling their key (external to BIND 9), but you can rely on dnssec- policy's key lifetime, as long as you pregenerate the keys before the successor needs to be pre-published.

Wondering out loud:
Could the new 'manual' mode in dnssec-policy be even better? It would prevent any automatic change at all, resulting in better external control.

--
Petr Špaček
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list.

Reply via email to