Please also mention to Randy that it would be much better to separate his signing and authoritative DNS servers. Running it all on the same server is probably not a good idea, especially with the signer being exposed to the public Internet.
Regards, Anand On Wed, 12 Jun 2024 at 17:42, Korry Luke <kol...@wide.ad.jp> wrote: > Hi Libor, > > Thanks for the advice, that appears to have done the trick. Much > appreciated! > > The original logic for the unsafe setting transition, as I understand, > was due to the effect of the DDoS, the signing host had started falling > behind with signing gradually to the point it missed a signing cycle and > started throwing errors/refusing to sign the zone entirely, which then > led to the > > We are out of the woods for now it seems, but we'll likely need to work > on followup in the coming days/weeks and future mitigation plans, > perhaps including some of the tuning you mentioned. Randy will likely > follow up separately, I think his mail server and DNS should be back up > and resolvable by now. > > Thanks again, just wanted to drop a quick note of appreciation. > > On 2024-06-12 15:52, libor.peltan via knot-dns-users wrote: > > Hi Korry, Randy, > > > >>> Manual: On > >>> Delete-Delay: 30d > >>> Unsafe-Operation: No-Check-Keyset > >>> ... > > > > What is the original point in using unsafe operation within your zones? > > > > In general, your key set is probably broken. As a result of the > > unsafe-operation settings, Knot ignores the issue and tries to sign > > the zone somehow, which however does not lead to good result in this > > situation. > > > > (Anyway, the delete-delay has no effect in manual policy.) > > > >>> > >>> # keymgr psg.com list > >>> 649b0d43d1493dd4ad30f8043ca4561c33c38b5a 53567 KSK > >>> RSASHA256/2048 publish=1078099200 active=1078099200 > >>> 173597db4b4f2f072b568cb637710e891ac52246 25843 ZSK > >>> RSASHA256/2048 publish=1709251200 active=1709251200 > >>> retire=1717977600 remove=1717977600 > >>> 3194d896f2a64f10b103991e5018b72cd3f1cd28 59161 ZSK > >>> RSASHA256/2048 publish=1709251200 active=1709251200 > >>> retire=1717977600 remove=1717977600 > >>> 7b1bf414b34f605c68f9ddb7b52c32c6b53da8d3 5489 KSK > >>> RSASHA256/2048 publish=1718161132 > >>> 902b8e02a5e75754bd69791735e76cb11c3e37af 22090 ZSK > >>> RSASHA256/2048 publish=1718161132 > >>> > >>> > > There are two ZSKs already retired by far, no problem with them. Than > > there is a KSK in active state. Do you actually expect this a to be a > > CSK, signing both the DNSKEY and the rest of the zone? Besides this, > > there is one KSK and one ZSK in "published" state, which means that > > they are not used for signing. > > > > I'd recommend you to clean up you keyset. The most straightforward way > > would be to make the existing published ZSK active (keymgr psg.com. > > set 902b8e02a5e75754bd69791735e76cb11c3e37af active=+0). Than decide > > what to do with the second published KSK (delete or what?). And > > finally, maybe deleting the old keys might be good idea, depending on > > their purpose. > > > > Please let us know how you proceed with this issue. > > > > Anyway, we are somewhat interested in your experience from under-DDoS > > operation. How severe they are and how they are affecting your > > authoritative DNS service? Maybe there would be good point in trying > > out XDP if the circumstances allow it? > > > > Thanks, > > > > Libor > > > > -- > > -- > Korry Luke > ルーク, コリー > kol...@wide.ad.jp > Graduate School of Media and Governance > Keio University Shonan Fujisawa Campus > 慶應義塾大学湘南藤沢キャンパス 政策・メディア研究科 > > -- >
--