Re: [Fwd: Outdated RIPE NCC Trust Anchors in Fedora Linux Repositories]

2010-02-05 Thread Alan Clegg
Paul Wouters wrote:

> With the current success of the DLV, and the root zone deployment half
> a year away, it is not really required anymore. I think it is much better
> to get rid of all trust anchors apart from the ISC DLV key.

Do remember, however, that the DLV keys also roll, so this does need to
be taken into account.

AlanC



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: [Fwd: Outdated RIPE NCC Trust Anchors in Fedora Linux Repositories]

2010-02-05 Thread Paul Wouters

On Sat, 6 Feb 2010, Mark Andrews wrote:


We (= me and Paul Wouters) are working on dnssec-conf update. Sorry
for troubles.



The better thing would be a a script to fetch the current keys
nightly, perform a sanity check, then update or inform the administator
and let them update the keys after inspection.  I do something like
this myself nightly.


With the current success of the DLV, and the root zone deployment half
a year away, it is not really required anymore. I think it is much better
to get rid of all trust anchors apart from the ISC DLV key.

Paul
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [Fwd: Outdated RIPE NCC Trust Anchors in Fedora Linux Repositories]

2010-02-05 Thread Mark Andrews

In message <20100205143439.ga15...@evileye.atkac.englab.brq.redhat.com>, Adam T
kac writes:
> On Fri, Feb 05, 2010 at 06:22:26AM -0800, Alan Clegg wrote:
> > I find this important enough to forward on to bind-users.
> > 
> > Please not the importance of trust anchor management.
> 
> We (= me and Paul Wouters) are working on dnssec-conf update. Sorry
> for troubles.
> 
> Regards, Adam

The better thing would be a a script to fetch the current keys
nightly, perform a sanity check, then update or inform the administator
and let them update the keys after inspection.  I do something like
this myself nightly.
 
Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [Fwd: Outdated RIPE NCC Trust Anchors in Fedora Linux Repositories]

2010-02-05 Thread Adam Tkac
On Fri, Feb 05, 2010 at 06:22:26AM -0800, Alan Clegg wrote:
> I find this important enough to forward on to bind-users.
> 
> Please not the importance of trust anchor management.

We (= me and Paul Wouters) are working on dnssec-conf update. Sorry
for troubles.

Regards, Adam

> Date: Fri, 05 Feb 2010 14:25:10 +0100
> From: Anand Buddhdev 
> To: dnssec-deploym...@dnssec-deployment.org
> Subject: [Dnssec-deployment] Outdated RIPE NCC Trust Anchors in Fedora
>  Linux Repositories
> User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-GB;
>  rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
> 
> [Apologies for duplicates]
> 
> Dear Colleagues,
> 
> We have discovered that recent versions of the Fedora Linux distribution
> are shipping with a package called "dnssec-conf", which contains the
> RIPE NCC's DNSSEC trust anchors. This package is installed by default as
> a dependency of BIND, and it configures BIND to do DNSSEC validation.
> 
> Unfortunately, the current version of this package (1.21) is outdated
> and contains old trust anchors.
> 
> On 16 December 2009, we had a key roll-over event, where we removed the
> old Key-Signing Keys (KSKs). From that time, BIND resolvers running on
> Fedora Linux distributions could not validate any signed responses in
> the RIPE NCC's reverse zones.
> 
> If you are running Fedora Linux with the standard BIND package, please
> edit the file "/etc/pki/dnssec-keys//named.dnssec.keys", and comment out
> all the lines in it containing the directory path "production/reverse".
> Then restart BIND.
> 
> This will stop BIND from using the outdated trust anchors. If you do
> want to use the RIPE NCC's trust anchors to validate our signed zones,
> we recommend that you fetch the latest trust anchor file from our
> website and reconfigure BIND to use it instead of the ones distributed
> in the dnssec-conf package:
> 
> https://www.ripe.net/projects/disi/keys/index.html
> 
> Please remember to check frequently for updates to our trust anchor
> file, as we introduce new Key-Signing Keys (KSKs) every 6 months.
> 
> Regards,
> 
> Anand Buddhdev,
> DNS Services Manager, RIPE NCC

-- 
Adam Tkac, Red Hat, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


[Fwd: Outdated RIPE NCC Trust Anchors in Fedora Linux Repositories]

2010-02-05 Thread Alan Clegg
I find this important enough to forward on to bind-users.

Please not the importance of trust anchor management.

AlanC
--- Begin Message ---
[Apologies for duplicates]

Dear Colleagues,

We have discovered that recent versions of the Fedora Linux distribution
are shipping with a package called "dnssec-conf", which contains the
RIPE NCC's DNSSEC trust anchors. This package is installed by default as
a dependency of BIND, and it configures BIND to do DNSSEC validation.

Unfortunately, the current version of this package (1.21) is outdated
and contains old trust anchors.

On 16 December 2009, we had a key roll-over event, where we removed the
old Key-Signing Keys (KSKs). From that time, BIND resolvers running on
Fedora Linux distributions could not validate any signed responses in
the RIPE NCC's reverse zones.

If you are running Fedora Linux with the standard BIND package, please
edit the file "/etc/pki/dnssec-keys//named.dnssec.keys", and comment out
all the lines in it containing the directory path "production/reverse".
Then restart BIND.

This will stop BIND from using the outdated trust anchors. If you do
want to use the RIPE NCC's trust anchors to validate our signed zones,
we recommend that you fetch the latest trust anchor file from our
website and reconfigure BIND to use it instead of the ones distributed
in the dnssec-conf package:

https://www.ripe.net/projects/disi/keys/index.html

Please remember to check frequently for updates to our trust anchor
file, as we introduce new Key-Signing Keys (KSKs) every 6 months.

Regards,

Anand Buddhdev,
DNS Services Manager, RIPE NCC
--- End Message ---


signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users