Hi dear knot users,

Back again with a yet another question on the same subject. Hopefully this time the last one...

We are a sub domain: sub.company.com, and in order to eanble DNSSEC, I need to enable DNSSEC on our knot zone sub.company.com, and send the DS key to company.com DNS admins for publication in the parent.

My goal is to minimize the time between enabling DNSSEC and having our DS key published in the parent zone.

As it turns out, is it incredibly difficult for company.com DNS admins to schedule a date/time to do this 'in sync' with us.

The parent zone is now asking me to simply enable DNSSEC, and send them the DS keys. They will then submit a support request for that already active DS key to be published into the company.com DNS.

Thing is: They are not sure how quickly that support request would be processed. So we could potentially face a significant amount of time (hours, days) of running knot with DNSSEC, without the DS key publised at the parent.

(so basically: a broken chain of trust situation)

My question: How disastrous (if at all) would that be? What consequences (if any) to expect?

Or is there perhaps another approach at this that we fail to see?

(other than asking company.com to change their dns hosting)

(I was thinking perhaps: quickly enable dnssec, take note of the generated DS key, disable dnssec again, sent the DS key to parent, wait for it to become published, and then re-enable dnssec on knot)

Enjoy your weekends everybody!

MJ


Op 31-08-2021 om 12:04 schreef mj:
ok, good to know!

Thanks (again!) for the quick reply!

MJ

Op 31-08-2021 om 12:01 schreef Daniel Salzman:
Hi,

The extra white space is just a redundant separation of a long hex string. You can ignore it.

Daniel

On 8/31/21 11:49 AM, mj wrote:
Hi,

We have a (hopefully last) follow-up question on the knot-generated dnssec keys for our domain.

Our policy is is set to algorithm: ECDSAP256SHA256. Upon knot start, knot generates the  key:

knotd[25835]: info: [company.com.] DNSSEC, key, tag 54011, algorithm ECDSAP256SHA256, KSK, public, ready, active+ knotd[25835]: info: [company.com.] DNSSEC, key, tag 49404, algorithm ECDSAP256SHA256, public, active
knotd[25835]: info: [company.com.] DNSSEC, signing started

Then we query the DS key to be published, the result is:

  keymgr company.com ds
company.com. DS 54011 13 2 f0892debae240caa01827becdd3d3cb0ef2512f5691ca525895777571a67e680 company.com. DS 54011 13 4 462211ea3e8d3ea19a2ae803b926af8df851369527879911318f59ff72973a72452e3f29265c339c6a61537a778c43da


Now the question. In most (if not all?) docs we read on the subject, the DS key looks something like:

knot-dns.cz.        3600    IN    DS    54959 13 2 268DE6EB7E0630953B8AF0F0037BF68FD10443BF01B5E17805AF94C2 6921897D
or
dnssec-tools.org.    21600    IN    DS    9638 13 2 92551AA25C4ADE8E2882FBF4BEB5B54F9D84379B153848852B68BB3C 793F4B0B

note the spaces at the end of the key string.

Our knot-generated DS key does not have a space in it.

Is something wrong? Do we need to add a space somewhere, or..?

Thanks again in advance for providing insight :-)

MJ
--
https://lists.nic.cz/mailman/listinfo/knot-dns-users

Reply via email to