Deprecation notice force BIND 9.20+: dnssec-must-be-secure option

2023-09-04 Thread Ondřej Surý
Hello,

in line with out deprecation policy, I am notifying the mailing list about our 
preliminary
intent to deprecate the 'dnssec-must-be-secure' option. The option will be 
marked as
deprecated (causing warning from named-checkconf) in BIND 9.18 and 9.20 and
it will be removed in BIND 9.21+ when the next development cycle starts next 
year.

The 'dnssec-must-be-secured' description from the ARM:

>This specifies hierarchies which must be or may not be secure (signed and
>validated). If ``yes``, then :iscman:`named` only accepts answers if
>they are secure. If ``no``, then normal DNSSEC validation applies,
>allowing insecure answers to be accepted. The specified domain
>must be defined as a trust anchor, for instance in a :any:`trust-anchors`
>statement, or ``dnssec-validation auto`` must be active.
> 

In BIND 9.21:

1. Using dnssec-must-be-secure option in named.conf will be now a fatal error

In BIND 9.18 and BIND 9.20:

1. Using dnssec-must-be-secure option in named.conf will issue a deprecation 
warning

This is tracked under https://gitlab.isc.org/isc-projects/bind9/-/issues/4263

Thanks.
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-28 Thread egoitz--- via bind-users
Hi Mark! 

Very thankful again for your time. Sorry for answering so late, but I
was not at the office yesterday. I answer below in blue for instance...

El 2022-01-27 02:56, Mark Andrews escribió:

> DNSSEC involves lots of timing / co-ordination points and if any of them get 
> delayed for any reason the
> following ones also need to be delayed.  While dnssec-keygen will allow you 
> to set all of the timers for
> all of a keys life, it is bad practice to do that. 
> 
> But as I have read in Michael Lucas book, it's recommended to refresh at 
> least ZSK keys from time to time. For that purpose... it's required to set 
> the needed date and times... isn't it?. 
> 
> If you are going to set the timers like this there needs to be much more time 
> between the inactivation time
> and the deletion time.   
> 
> I see, so first and required value of sig-validity-interval <= deletion time 
> - inactivation time then ?. 
> 
> As I said earlier about 30 days with default values for 
> sig-validity-interval. 
> 
> This is the reason by which I have deduced the formula written above... 
> 
> Thanks again Mark
> Cheers 
> 
> Mark
> 
> On 25 Jan 2022, at 18:46, ego...@ramattack.net wrote:
> 
> Hi!!
> 
> Don't really know if it could help, but I generate the ZSK keys this way :
> 
> /usr/local/sbin/dnssec-keygen -3 -a 8 -b 1024 -P now -A now -I +45d -D +47d 
> _
> 
> Cheers!!
> 
> El 2022-01-25 02:48, Mark Andrews escribió:
> 
> On 25 Jan 2022, at 11:55, ego...@ramattack.net wrote:
> 
> Hi Mark!!
> 
> Thank you so much for your answer!! and your time!!.
> 
> I have a couple of questions. I ask them between your lines and in blue for 
> instance... for emphasizing and being easier to see what I'm referring to. 
> I'm talking about ZSK keys in the questions I am asking in blue.
> 
> El 2022-01-25 00:36, Mark Andrews escribió:
> 
> How 'named' manages DNSSEC is very different to how 'dnssec-signzone' manages 
> DNSSEC.  When you tell named to
> inactivate a DNSKEY it stops re-signing the zone with it and it stops signing 
> new records added to the zone
> with it.  
> 
> The fact is, I don't tell named nothing really. It maintains the zone 
> signatures (I'm using inline-signing yes; auto-dnssec maintain; per zone). I 
> just provide it keys and then I wait, until the ZSK key's delete time 
> arrives, then I remove it's files (.key and .private). I don't wait until the 
> inactive time. I wait until the delete time (not the inactive time). After 
> the delete time of the key, can still records (rrsigs) exist signed with that 
> key then?.

Yes.  

>> It DOES NOT immediately replace all RRSIGs generated using that key.  Those 
>> records will be replaced
>> over the sig-validity-interval as they fall due for re-signing.  Once all 
>> those RRSIG records have been
>> replaced and they have expired from caches, you can then delete the DNSKEY 
>> record.
>> 
>> With the default sig-validity-interval (30) that takes up to 22.5 days to 
>> which you have to add the record TTL.
>> 
>> Ok, but does sig-validity-interval affect too, after the key deletion date?. 
>> Or does it affect only from the inactivation date to the deletion date of a 
>> key?.

sig-validity-interval and re-signing is independent of inactive and
delete dates.

> Mark
> 
> Best regards
> 
> On 25 Jan 2022, at 05:21, egoitz--- via bind-users  
> wrote:
> 
> Hi!!
> 
> Thanks a lot for your answer!!
> 
> I tried before the fact of renaming back and rndc sign... but does not 
> work just has removed the error from the log
> 
> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
> (.key and .private) until have passed at least 2 days from the deletion 
> time... Let's see if this way works better
> 
> Any more ideas mates?.
> 
> Thank you so much for your time :)
> 
> Best regards,
> 
> El 2022-01-24 17:51, Tony Finch escribió:
> 
> ATENCION
> ATENCION
> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
> remitente y sepa que el contenido es seguro.
> 
> egoitz--- via bind-users  wrote: 
> These are the contents of a cat of the private file I have renamed to
> samename.private-OLD :
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> Yes, it can be confusing when the state of the key files doesn't match the
> state of the zone.
> 
> I think you said you have renamed all your key files back to their usual
> non-OLD names. Good; that is necessary if named is still looking for a key
> file even if it shouldn't need it any more.
> 
> Then, try running `rndc sign `, to make named reload the keys. I
> think that should also get it to make whatever updates might be necessary.
> 
> Then look at the logs to see if there are errors, and look at the DNSKEY
> RRset (with its RRSIGs) to make sure it matches what you expect.
> 
> If that 

Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-26 Thread Mark Andrews

DNSSEC involves lots of timing / co-ordination points and if any of them get 
delayed for any reason the
following ones also need to be delayed.  While dnssec-keygen will allow you to 
set all of the timers for
all of a keys life, it is bad practice to do that. 

If you are going to set the timers like this there needs to be much more time 
between the inactivation time
and the deletion time.  As I said earlier about 30 days with default values for 
sig-validity-interval.

Mark


> On 25 Jan 2022, at 18:46, ego...@ramattack.net wrote:
> 
> Hi!!
> 
> 
> 
> Don't really know if it could help, but I generate the ZSK keys this way :
> 
> 
> 
> /usr/local/sbin/dnssec-keygen -3 -a 8 -b 1024 -P now -A now -I +45d -D +47d 
> _
> 
> 
> 
> Cheers!!
> 
>  
> 
> 
> El 2022-01-25 02:48, Mark Andrews escribió:
> 
>> 
>> 
>> 
>> 
>>> On 25 Jan 2022, at 11:55, ego...@ramattack.net wrote:
>>> 
>>> Hi Mark!!
>>> 
>>> 
>>> 
>>> Thank you so much for your answer!! and your time!!.
>>> 
>>> 
>>> 
>>> I have a couple of questions. I ask them between your lines and in blue for 
>>> instance... for emphasizing and being easier to see what I'm referring to. 
>>> I'm talking about ZSK keys in the questions I am asking in blue.
>>> 
>>>  
>>> 
>>> 
>>> El 2022-01-25 00:36, Mark Andrews escribió:
>>> 
 
 How 'named' manages DNSSEC is very different to how 'dnssec-signzone' 
 manages DNSSEC.  When you tell named to
 inactivate a DNSKEY it stops re-signing the zone with it and it stops 
 signing new records added to the zone
 with it.  
  
  
 The fact is, I don't tell named nothing really. It maintains the zone 
 signatures (I'm using inline-signing yes; auto-dnssec maintain; per zone). 
 I just provide it keys and then I wait, until the ZSK key's delete time 
 arrives, then I remove it's files (.key and .private). I don't wait until 
 the inactive time. I wait until the delete time (not the inactive time). 
 After the delete time of the key, can still records (rrsigs) exist signed 
 with that key then?.
>> 
>> Yes.  
>> 
 It DOES NOT immediately replace all RRSIGs generated using that key.  
 Those records will be replaced
 over the sig-validity-interval as they fall due for re-signing.  Once all 
 those RRSIG records have been
 replaced and they have expired from caches, you can then delete the DNSKEY 
 record.
 
 With the default sig-validity-interval (30) that takes up to 22.5 days to 
 which you have to add the record TTL.
  
 Ok, but does sig-validity-interval affect too, after the key deletion 
 date?. Or does it affect only from the inactivation date to the deletion 
 date of a key?.
>> 
>> sig-validity-interval and re-signing is independent of inactive and delete 
>> dates.
>> 
 Mark
  
  
 Best regards
 
> On 25 Jan 2022, at 05:21, egoitz--- via bind-users 
>  wrote:
> 
> Hi!!
> 
> 
> 
> Thanks a lot for your answer!!
> 
> 
> 
> I tried before the fact of renaming back and rndc sign... but does not 
> work just has removed the error from the log
> 
> 
> 
> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
> (.key and .private) until have passed at least 2 days from the deletion 
> time... Let's see if this way works better
> 
>  
> 
> 
> Any more ideas mates?.
> 
> 
> 
> Thank you so much for your time :)
> 
> 
> 
> Best regards,
> 
> El 2022-01-24 17:51, Tony Finch escribió:
> 
>> ATENCION
>> ATENCION
>> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
>> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
>> remitente y sepa que el contenido es seguro.
>> 
>> egoitz--- via bind-users  wrote:
>>> 
>>> These are the contents of a cat of the private file I have renamed to
>>> samename.private-OLD :
>>> 
>>> Created: 20211031230338
>>> Publish: 2020220241
>>> Activate: 2020220341
>>> Inactive: 20211215230338
>>> Delete: 20211217230338
>> 
>> Yes, it can be confusing when the state of the key files doesn't match 
>> the
>> state of the zone.
>> 
>> I think you said you have renamed all your key files back to their usual
>> non-OLD names. Good; that is necessary if named is still looking for a 
>> key
>> file even if it shouldn't need it any more.
>> 
>> Then, try running `rndc sign `, to make named reload the keys. I
>> think that should also get it to make whatever updates might be 
>> necessary.
>> 
>> Then look at the logs to see if there are errors, and look at the DNSKEY
>> RRset (with its RRSIGs) to make sure it matches what you expect.
>> 
>> If that doesn't get things straightened out then, um, dunno :-)
>> 
>> I 

Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Hi!! 

Don't really know if it could help, but I generate the ZSK keys this way
: 

/usr/local/sbin/dnssec-keygen -3 -a 8 -b 1024 -P now -A now -I +45d -D
+47d _ 

Cheers!!

El 2022-01-25 02:48, Mark Andrews escribió:

> On 25 Jan 2022, at 11:55, ego...@ramattack.net wrote:
> 
> Hi Mark!!
> 
> Thank you so much for your answer!! and your time!!.
> 
> I have a couple of questions. I ask them between your lines and in blue for 
> instance... for emphasizing and being easier to see what I'm referring to. 
> I'm talking about ZSK keys in the questions I am asking in blue.
> 
> El 2022-01-25 00:36, Mark Andrews escribió:
> 
> How 'named' manages DNSSEC is very different to how 'dnssec-signzone' manages 
> DNSSEC.  When you tell named to
> inactivate a DNSKEY it stops re-signing the zone with it and it stops signing 
> new records added to the zone
> with it.  
> 
> The fact is, I don't tell named nothing really. It maintains the zone 
> signatures (I'm using inline-signing yes; auto-dnssec maintain; per zone). I 
> just provide it keys and then I wait, until the ZSK key's delete time 
> arrives, then I remove it's files (.key and .private). I don't wait until the 
> inactive time. I wait until the delete time (not the inactive time). After 
> the delete time of the key, can still records (rrsigs) exist signed with that 
> key then?.

Yes.  

>> It DOES NOT immediately replace all RRSIGs generated using that key.  Those 
>> records will be replaced
>> over the sig-validity-interval as they fall due for re-signing.  Once all 
>> those RRSIG records have been
>> replaced and they have expired from caches, you can then delete the DNSKEY 
>> record.
>> 
>> With the default sig-validity-interval (30) that takes up to 22.5 days to 
>> which you have to add the record TTL.
>> 
>> Ok, but does sig-validity-interval affect too, after the key deletion date?. 
>> Or does it affect only from the inactivation date to the deletion date of a 
>> key?.

sig-validity-interval and re-signing is independent of inactive and
delete dates.

> Mark
> 
> Best regards
> 
> On 25 Jan 2022, at 05:21, egoitz--- via bind-users  
> wrote:
> 
> Hi!!
> 
> Thanks a lot for your answer!!
> 
> I tried before the fact of renaming back and rndc sign... but does not 
> work just has removed the error from the log
> 
> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
> (.key and .private) until have passed at least 2 days from the deletion 
> time... Let's see if this way works better
> 
> Any more ideas mates?.
> 
> Thank you so much for your time :)
> 
> Best regards,
> 
> El 2022-01-24 17:51, Tony Finch escribió:
> 
> ATENCION
> ATENCION
> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
> remitente y sepa que el contenido es seguro.
> 
> egoitz--- via bind-users  wrote: 
> These are the contents of a cat of the private file I have renamed to
> samename.private-OLD :
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> Yes, it can be confusing when the state of the key files doesn't match the
> state of the zone.
> 
> I think you said you have renamed all your key files back to their usual
> non-OLD names. Good; that is necessary if named is still looking for a key
> file even if it shouldn't need it any more.
> 
> Then, try running `rndc sign `, to make named reload the keys. I
> think that should also get it to make whatever updates might be necessary.
> 
> Then look at the logs to see if there are errors, and look at the DNSKEY
> RRset (with its RRSIGs) to make sure it matches what you expect.
> 
> If that doesn't get things straightened out then, um, dunno :-)
> 
> I guess it is possible to get into a muddle if you try to move a key out
> of the way very soon after its delete time. By default, named does key
> maintenance infrequently, so I guess if you move the key after its
> deletion time but before the next key maintenance cycle, things will get
> out of sync. But I have not checked whether my guess is right or not.
> 
> Tony.
 ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list

ISC funds the development of this software with paid support
subscriptions. Contact us at https://www.isc.org/contact/ for more
information.

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Hi Mark!!! 

Thanks again!!!. Very very thankful really. Please allow me to answer
you something more as we found a guru here :) :) 

But then Mark, what does a key deletion time of a key mean?. I
understood that when the deletion time was overtaken in a ZSK, the key
dissapeared from the DNSKEY and so... it should not exist RRSIGs with
that ZSK (because that RRSIG could not become validated with a valid/in
effect ZSK) key because all should have been renewed between the key
inactive time and the delete time. I assume I am wrong then. I read the
ARM and understood that. What I'm missing or what I have misunderstood
if you are so kind as to clarify me?. 

By the way, when you say "sig-validity-interval and re-signing is
independent of inactive and delete dates" I understand but I assume,
then I don't have clear the concept of "key delete time", because I
thought that sig-validity-interval and the fact of re-signing, was just
applied to in effect keys. 

I would be very thankful if you could help me clarifying the delete time
of a key then... I'm going to try to do it by my own, reading the ARM
relevant parts again too... 

As said before, extremely thankful Mark :) 

Regards,

El 2022-01-25 02:48, Mark Andrews escribió:

> On 25 Jan 2022, at 11:55, ego...@ramattack.net wrote:
> 
> Hi Mark!!
> 
> Thank you so much for your answer!! and your time!!.
> 
> I have a couple of questions. I ask them between your lines and in blue for 
> instance... for emphasizing and being easier to see what I'm referring to. 
> I'm talking about ZSK keys in the questions I am asking in blue.
> 
> El 2022-01-25 00:36, Mark Andrews escribió:
> 
> How 'named' manages DNSSEC is very different to how 'dnssec-signzone' manages 
> DNSSEC.  When you tell named to
> inactivate a DNSKEY it stops re-signing the zone with it and it stops signing 
> new records added to the zone
> with it.  
> 
> The fact is, I don't tell named nothing really. It maintains the zone 
> signatures (I'm using inline-signing yes; auto-dnssec maintain; per zone). I 
> just provide it keys and then I wait, until the ZSK key's delete time 
> arrives, then I remove it's files (.key and .private). I don't wait until the 
> inactive time. I wait until the delete time (not the inactive time). After 
> the delete time of the key, can still records (rrsigs) exist signed with that 
> key then?.

Yes.  

>> It DOES NOT immediately replace all RRSIGs generated using that key.  Those 
>> records will be replaced
>> over the sig-validity-interval as they fall due for re-signing.  Once all 
>> those RRSIG records have been
>> replaced and they have expired from caches, you can then delete the DNSKEY 
>> record.
>> 
>> With the default sig-validity-interval (30) that takes up to 22.5 days to 
>> which you have to add the record TTL.
>> 
>> Ok, but does sig-validity-interval affect too, after the key deletion date?. 
>> Or does it affect only from the inactivation date to the deletion date of a 
>> key?.

sig-validity-interval and re-signing is independent of inactive and
delete dates.

> Mark
> 
> Best regards
> 
> On 25 Jan 2022, at 05:21, egoitz--- via bind-users  
> wrote:
> 
> Hi!!
> 
> Thanks a lot for your answer!!
> 
> I tried before the fact of renaming back and rndc sign... but does not 
> work just has removed the error from the log
> 
> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
> (.key and .private) until have passed at least 2 days from the deletion 
> time... Let's see if this way works better
> 
> Any more ideas mates?.
> 
> Thank you so much for your time :)
> 
> Best regards,
> 
> El 2022-01-24 17:51, Tony Finch escribió:
> 
> ATENCION
> ATENCION
> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
> remitente y sepa que el contenido es seguro.
> 
> egoitz--- via bind-users  wrote: 
> These are the contents of a cat of the private file I have renamed to
> samename.private-OLD :
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> Yes, it can be confusing when the state of the key files doesn't match the
> state of the zone.
> 
> I think you said you have renamed all your key files back to their usual
> non-OLD names. Good; that is necessary if named is still looking for a key
> file even if it shouldn't need it any more.
> 
> Then, try running `rndc sign `, to make named reload the keys. I
> think that should also get it to make whatever updates might be necessary.
> 
> Then look at the logs to see if there are errors, and look at the DNSKEY
> RRset (with its RRSIGs) to make sure it matches what you expect.
> 
> If that doesn't get things straightened out then, um, dunno :-)
> 
> I guess it is possible to get into a muddle if you try to move a key out
> of the way very soon after its delete time. By default, named does key
> maintenance 

Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread Mark Andrews


> On 25 Jan 2022, at 11:55, ego...@ramattack.net wrote:
> 
> Hi Mark!!
> 
> 
> 
> Thank you so much for your answer!! and your time!!.
> 
> 
> 
> I have a couple of questions. I ask them between your lines and in blue for 
> instance... for emphasizing and being easier to see what I'm referring to. 
> I'm talking about ZSK keys in the questions I am asking in blue.
> 
>  
> 
> 
> El 2022-01-25 00:36, Mark Andrews escribió:
> 
>> 
>> How 'named' manages DNSSEC is very different to how 'dnssec-signzone' 
>> manages DNSSEC.  When you tell named to
>> inactivate a DNSKEY it stops re-signing the zone with it and it stops 
>> signing new records added to the zone
>> with it.  
>>  
>>  
>> The fact is, I don't tell named nothing really. It maintains the zone 
>> signatures (I'm using inline-signing yes; auto-dnssec maintain; per zone). I 
>> just provide it keys and then I wait, until the ZSK key's delete time 
>> arrives, then I remove it's files (.key and .private). I don't wait until 
>> the inactive time. I wait until the delete time (not the inactive time). 
>> After the delete time of the key, can still records (rrsigs) exist signed 
>> with that key then?.

Yes.  

>> It DOES NOT immediately replace all RRSIGs generated using that key.  Those 
>> records will be replaced
>> over the sig-validity-interval as they fall due for re-signing.  Once all 
>> those RRSIG records have been
>> replaced and they have expired from caches, you can then delete the DNSKEY 
>> record.
>> 
>> With the default sig-validity-interval (30) that takes up to 22.5 days to 
>> which you have to add the record TTL.
>>  
>> Ok, but does sig-validity-interval affect too, after the key deletion date?. 
>> Or does it affect only from the inactivation date to the deletion date of a 
>> key?.

sig-validity-interval and re-signing is independent of inactive and delete 
dates.

>> Mark
>>  
>>  
>> Best regards
>> 
>>> On 25 Jan 2022, at 05:21, egoitz--- via bind-users 
>>>  wrote:
>>> 
>>> Hi!!
>>> 
>>> 
>>> 
>>> Thanks a lot for your answer!!
>>> 
>>> 
>>> 
>>> I tried before the fact of renaming back and rndc sign... but does not 
>>> work just has removed the error from the log
>>> 
>>> 
>>> 
>>> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
>>> (.key and .private) until have passed at least 2 days from the deletion 
>>> time... Let's see if this way works better
>>> 
>>>  
>>> 
>>> 
>>> Any more ideas mates?.
>>> 
>>> 
>>> 
>>> Thank you so much for your time :)
>>> 
>>> 
>>> 
>>> Best regards,
>>> 
>>> El 2022-01-24 17:51, Tony Finch escribió:
>>> 
 ATENCION
 ATENCION
 ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
 pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
 remitente y sepa que el contenido es seguro.
 
 egoitz--- via bind-users  wrote:
> 
> These are the contents of a cat of the private file I have renamed to
> samename.private-OLD :
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338
 
 Yes, it can be confusing when the state of the key files doesn't match the
 state of the zone.
 
 I think you said you have renamed all your key files back to their usual
 non-OLD names. Good; that is necessary if named is still looking for a key
 file even if it shouldn't need it any more.
 
 Then, try running `rndc sign `, to make named reload the keys. I
 think that should also get it to make whatever updates might be necessary.
 
 Then look at the logs to see if there are errors, and look at the DNSKEY
 RRset (with its RRSIGs) to make sure it matches what you expect.
 
 If that doesn't get things straightened out then, um, dunno :-)
 
 I guess it is possible to get into a muddle if you try to move a key out
 of the way very soon after its delete time. By default, named does key
 maintenance infrequently, so I guess if you move the key after its
 deletion time but before the next key maintenance cycle, things will get
 out of sync. But I have not checked whether my guess is right or not.
 
 Tony.
>>> ___
>>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
>>> unsubscribe from this list
>>> 
>>> ISC funds the development of this software with paid support subscriptions. 
>>> Contact us at https://www.isc.org/contact/ for more information.
>>> 
>>> 
>>> bind-users mailing list
>>> bind-users@lists.isc.org
>>> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development 

Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Hi Mark!! 

Thank you so much for your answer!! and your time!!. 

I have a couple of questions. I ask them between your lines and in blue
for instance... for emphasizing and being easier to see what I'm
referring to. I'm talking about ZSK keys in the questions I am asking in
blue.

El 2022-01-25 00:36, Mark Andrews escribió:

> How 'named' manages DNSSEC is very different to how 'dnssec-signzone' manages 
> DNSSEC.  When you tell named to
> inactivate a DNSKEY it stops re-signing the zone with it and it stops signing 
> new records added to the zone
> with it.   
> 
> THE FACT IS, I DON'T TELL NAMED NOTHING REALLY. IT MAINTAINS THE ZONE 
> SIGNATURES (I'M USING INLINE-SIGNING YES; AUTO-DNSSEC MAINTAIN; PER ZONE). I 
> JUST PROVIDE IT KEYS AND THEN I WAIT, UNTIL THE ZSK KEY'S DELETE TIME 
> ARRIVES, THEN I REMOVE IT'S FILES (.KEY AND .PRIVATE). I DON'T WAIT UNTIL THE 
> INACTIVE TIME. I WAIT UNTIL THE DELETE TIME (NOT THE INACTIVE TIME). AFTER 
> THE DELETE TIME OF THE KEY, CAN STILL RECORDS (RRSIGS) EXIST SIGNED WITH THAT 
> KEY THEN?. 
> 
> It DOES NOT immediately replace all RRSIGs generated using that key.  Those 
> records will be replaced
> over the sig-validity-interval as they fall due for re-signing.  Once all 
> those RRSIG records have been
> replaced and they have expired from caches, you can then delete the DNSKEY 
> record.
> 
> With the default sig-validity-interval (30) that takes up to 22.5 days to 
> which you have to add the record TTL. 
> 
> OK, BUT DOES SIG-VALIDITY-INTERVAL AFFECT TOO, AFTER THE KEY DELETION DATE?. 
> OR DOES IT AFFECT ONLY FROM THE INACTIVATION DATE TO THE DELETION DATE OF A 
> KEY?.
> 
> Mark 
> 
> BEST REGARDS
> 
> On 25 Jan 2022, at 05:21, egoitz--- via bind-users  
> wrote:
> 
> Hi!!
> 
> Thanks a lot for your answer!!
> 
> I tried before the fact of renaming back and rndc sign... but does not 
> work just has removed the error from the log
> 
> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
> (.key and .private) until have passed at least 2 days from the deletion 
> time... Let's see if this way works better
> 
> Any more ideas mates?.
> 
> Thank you so much for your time :)
> 
> Best regards,
> 
> El 2022-01-24 17:51, Tony Finch escribió:
> 
> ATENCION
> ATENCION
> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
> remitente y sepa que el contenido es seguro.
> 
> egoitz--- via bind-users  wrote: 
> These are the contents of a cat of the private file I have renamed to
> samename.private-OLD :
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> Yes, it can be confusing when the state of the key files doesn't match the
> state of the zone.
> 
> I think you said you have renamed all your key files back to their usual
> non-OLD names. Good; that is necessary if named is still looking for a key
> file even if it shouldn't need it any more.
> 
> Then, try running `rndc sign `, to make named reload the keys. I
> think that should also get it to make whatever updates might be necessary.
> 
> Then look at the logs to see if there are errors, and look at the DNSKEY
> RRset (with its RRSIGs) to make sure it matches what you expect.
> 
> If that doesn't get things straightened out then, um, dunno :-)
> 
> I guess it is possible to get into a muddle if you try to move a key out
> of the way very soon after its delete time. By default, named does key
> maintenance infrequently, so I guess if you move the key after its
> deletion time but before the next key maintenance cycle, things will get
> out of sync. But I have not checked whether my guess is right or not.
> 
> Tony.
 ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list

ISC funds the development of this software with paid support
subscriptions. Contact us at https://www.isc.org/contact/ for more
information.

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread Mark Andrews


How ‘named’ manages DNSSEC is very different to how 'dnssec-signzone' manages 
DNSSEC.  When you tell named to
inactivate a DNSKEY it stops re-signing the zone with it and it stops signing 
new records added to the zone
with it.  It DOES NOT immediately replace all RRSIGs generated using that key.  
Those records will be replaced
over the sig-validity-interval as they fall due for re-signing.  Once all those 
RRSIG records have been
replaced and they have expired from caches, you can then delete the DNSKEY 
record.

With the default sig-validity-interval (30) that takes up to 22.5 days to which 
you have to add the record TTL.

Mark

> On 25 Jan 2022, at 05:21, egoitz--- via bind-users  
> wrote:
> 
> Hi!!
> 
> 
> 
> Thanks a lot for your answer!!
> 
> 
> 
> I tried before the fact of renaming back and rndc sign... but does not 
> work just has removed the error from the log
> 
> 
> 
> I have changed my key managing code, for not renaming to "-OLD"  the ZSK 
> (.key and .private) until have passed at least 2 days from the deletion 
> time... Let's see if this way works better
> 
>  
> 
> 
> Any more ideas mates?.
> 
> 
> 
> Thank you so much for your time :)
> 
> 
> 
> Best regards,
> 
> El 2022-01-24 17:51, Tony Finch escribió:
> 
>> ATENCION
>> ATENCION
>> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
>> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
>> remitente y sepa que el contenido es seguro.
>> 
>> egoitz--- via bind-users  wrote:
>>> 
>>> These are the contents of a cat of the private file I have renamed to
>>> samename.private-OLD :
>>> 
>>> Created: 20211031230338
>>> Publish: 2020220241
>>> Activate: 2020220341
>>> Inactive: 20211215230338
>>> Delete: 20211217230338
>> 
>> Yes, it can be confusing when the state of the key files doesn't match the
>> state of the zone.
>> 
>> I think you said you have renamed all your key files back to their usual
>> non-OLD names. Good; that is necessary if named is still looking for a key
>> file even if it shouldn't need it any more.
>> 
>> Then, try running `rndc sign `, to make named reload the keys. I
>> think that should also get it to make whatever updates might be necessary.
>> 
>> Then look at the logs to see if there are errors, and look at the DNSKEY
>> RRset (with its RRSIGs) to make sure it matches what you expect.
>> 
>> If that doesn't get things straightened out then, um, dunno :-)
>> 
>> I guess it is possible to get into a muddle if you try to move a key out
>> of the way very soon after its delete time. By default, named does key
>> maintenance infrequently, so I guess if you move the key after its
>> deletion time but before the next key maintenance cycle, things will get
>> out of sync. But I have not checked whether my guess is right or not.
>> 
>> Tony.
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Hi!! 

Thanks a lot for your answer!! 

I tried before the fact of renaming back and rndc sign... but does not
work just has removed the error from the log 

I have changed my key managing code, for not renaming to "-OLD"  the ZSK
(.key and .private) until have passed at least 2 days from the deletion
time... Let's see if this way works better

Any more ideas mates?. 

Thank you so much for your time :) 

Best regards, 

El 2022-01-24 17:51, Tony Finch escribió:

> ATENCION
> ATENCION
> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
> remitente y sepa que el contenido es seguro.
> 
> egoitz--- via bind-users  wrote: 
> 
>> These are the contents of a cat of the private file I have renamed to
>> samename.private-OLD :
>> 
>> Created: 20211031230338
>> Publish: 2020220241
>> Activate: 2020220341
>> Inactive: 20211215230338
>> Delete: 20211217230338
> 
> Yes, it can be confusing when the state of the key files doesn't match the
> state of the zone.
> 
> I think you said you have renamed all your key files back to their usual
> non-OLD names. Good; that is necessary if named is still looking for a key
> file even if it shouldn't need it any more.
> 
> Then, try running `rndc sign `, to make named reload the keys. I
> think that should also get it to make whatever updates might be necessary.
> 
> Then look at the logs to see if there are errors, and look at the DNSKEY
> RRset (with its RRSIGs) to make sure it matches what you expect.
> 
> If that doesn't get things straightened out then, um, dunno :-)
> 
> I guess it is possible to get into a muddle if you try to move a key out
> of the way very soon after its delete time. By default, named does key
> maintenance infrequently, so I guess if you move the key after its
> deletion time but before the next key maintenance cycle, things will get
> out of sync. But I have not checked whether my guess is right or not.
> 
> Tony.___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread Tony Finch
egoitz--- via bind-users  wrote:
>
> These are the contents of a cat of the private file I have renamed to
> samename.private-OLD :
>
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338

Yes, it can be confusing when the state of the key files doesn't match the
state of the zone.

I think you said you have renamed all your key files back to their usual
non-OLD names. Good; that is necessary if named is still looking for a key
file even if it shouldn't need it any more.

Then, try running `rndc sign `, to make named reload the keys. I
think that should also get it to make whatever updates might be necessary.

Then look at the logs to see if there are errors, and look at the DNSKEY
RRset (with its RRSIGs) to make sure it matches what you expect.

If that doesn't get things straightened out then, um, dunno :-)

I guess it is possible to get into a muddle if you try to move a key out
of the way very soon after its delete time. By default, named does key
maintenance infrequently, so I guess if you move the key after its
deletion time but before the next key maintenance cycle, things will get
out of sync. But I have not checked whether my guess is right or not.

Tony.
-- 
f.anthony.n.finchhttps://dotat.at/
St Davids Head to Great Orme Head, including St Georges Channel:
Variable 2 to 4. Smooth or slight. Fair. Good.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Hi! 

In the "Bump in wire" dns machine, have finally ended up by fixing the
errors. For that purpose I have done a : 

In the directory of the zone file : 

- rename the own zonefile to zonefile-NO 

- rename the zonefile.jbk to zonefile.jbk-NO 

- rename the zonefile.jnl to zonefile.jnl-NO 

- rename the zonefile.signed to zonefile.signed-NO 

- rename the zonefile.signed.jnl to zonefile.signed.jnl-NO 

After that : 

- rndc retransfer thedomain.thetld 

- rndc sign thedomain.thetld 

- rndc signing -nsec3param 1 0 10 5F0F0D thedomain.thetld 

It seems now I have the zone signed (with the same keys) and without
errors. I suppose this is not valid for production really, because you
could have some records signed with an inactive (but in effect ZSK) and
I suppose that ZSK won't be entered in the DNSKEY?. Apart from that,
obviously I would needed to manage to increase SOA in order the zone to
be updated in our Internet facing nameservers, that it's another thing
to do. 

What could be the proper way of fixing this?. Is this normal?. Why could
it happened?. 

Best regards, 

El 2022-01-24 16:13, ego...@ramattack.net escribió:

> If you return the -OLD files to it's before name (without -OLD) and you make 
> changes to the zone or perform rndc loadkeys of the zone, error dissapear but 
> still the DNSKEY become outdated 
> 
> Any ideas mates?
> 
> El 2022-01-24 16:12, ego...@ramattack.net escribió: 
> 
> I think the problem is that if you do a : 
> 
> dig +multi @dnssecserver thedomain.thetld dnskey +dnssec | grep 44526 
> 
> You then see still that key id exists in DNSKEY records (and an RRSIG of that 
> ZSK, the 44526, but outdated). 
> 
> But I don't really understand why because you see the delete date of 44526 is 
> very old 
> 
> Anyway that could explain the error : "dns_dnssec_keylistfromrdataset: error 
> reading .private: File not found", because it seems Bind source code, 
> checks the DNSKEY and later tries to load that keys. As the files for keyid 
> 44526 don't exist, that could (are renamed) that could explain the error. 
> 
> But why has this happened??. Sometime ago, it happened to me that in this 
> machine (it's more than nothing a learning machine), the ZSK got outdated 
> because the script in charge of renewing the zsk was stopped. So the only 
> supposed valid key could have been in that moment the KSK (which does not get 
> expired). Could perhaps, those ZSK become everlasting or similar, although in 
> the file the date sais it's totally outdated 
> 
> I can't understand what's happening there... 
> 
> Regards,
> 
> El 2022-01-24 15:04, ego...@ramattack.net escribió: 
> 
> In fact... in a domain for whom I have seen these errors, it's arguing about 
> key id 44526 (it's private file) saying "File not found". But if I perform an 
> axfr request of the signed zone with pipe grep the key id, no matches 
> appear... so should not exist rrsigs for that key 
> 
> These are the contents of a cat of the private file I have renamed to 
> samename.private-OLD : 
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> 
> Not understandable 
> 
> Cheers,
> 
> El 2022-01-24 14:58, egoitz--- via bind-users escribió: Hi Klaus, 
> 
> Thank you so much for your answer but when Bind deletes a key from a zone, if 
> I remember correctly, there should not be any rrsig still active, signed 
> previously by the deleted key. Isn't it?. So I assume in that case, I should 
> be doing it properly but still see these messages. 
> 
> Am I wrong Klaus in some statement?. If a ZSK is deleted (I'm not renewing 
> KSK at the moment) no RRSIG with that key should exist... 
> 
> Cheers!
> 
> El 2022-01-24 13:08, Klaus Darilion escribió: 
> 
> IIRC, Bind needs the key as long as there are signatures in the zone 
> generated by this key. After key deactivation I waited the RRSIG lifetime 
> before deleting them. 
> 
> regards 
> 
> Klaus 
> 
> VON: bind-users  IM AUFTRAG VON egoitz--- 
> via bind-users
> GESENDET: Montag, 24. Jänner 2022 13:00
> AN: bind-users@lists.isc.org
> BETREFF: Bind 9, dnssec, and .key .private files physical deletion after the 
> key id becomes deleted from zone (the key becomes outdated) 
> 
> Good morning, 
> 
> I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;"  and 
> "auto-dnssec maintain;" for that reason. 
> 
> I do the task of ensuring always are valid keys in the zone with an script 
> that generates them whenever is needed. All fine until here and all working. 
> 
> I have seen, that Bind logs in messages log file sometim

Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
If you return the -OLD files to it's before name (without -OLD) and you
make changes to the zone or perform rndc loadkeys of the zone, error
dissapear but still the DNSKEY become outdated 

Any ideas mates?

El 2022-01-24 16:12, ego...@ramattack.net escribió:

> I think the problem is that if you do a : 
> 
> dig +multi @dnssecserver thedomain.thetld dnskey +dnssec | grep 44526 
> 
> You then see still that key id exists in DNSKEY records (and an RRSIG of that 
> ZSK, the 44526, but outdated). 
> 
> But I don't really understand why because you see the delete date of 44526 is 
> very old 
> 
> Anyway that could explain the error : "dns_dnssec_keylistfromrdataset: error 
> reading .private: File not found", because it seems Bind source code, 
> checks the DNSKEY and later tries to load that keys. As the files for keyid 
> 44526 don't exist, that could (are renamed) that could explain the error. 
> 
> But why has this happened??. Sometime ago, it happened to me that in this 
> machine (it's more than nothing a learning machine), the ZSK got outdated 
> because the script in charge of renewing the zsk was stopped. So the only 
> supposed valid key could have been in that moment the KSK (which does not get 
> expired). Could perhaps, those ZSK become everlasting or similar, although in 
> the file the date sais it's totally outdated 
> 
> I can't understand what's happening there... 
> 
> Regards,
> 
> El 2022-01-24 15:04, ego...@ramattack.net escribió: 
> 
> In fact... in a domain for whom I have seen these errors, it's arguing about 
> key id 44526 (it's private file) saying "File not found". But if I perform an 
> axfr request of the signed zone with pipe grep the key id, no matches 
> appear... so should not exist rrsigs for that key 
> 
> These are the contents of a cat of the private file I have renamed to 
> samename.private-OLD : 
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> 
> Not understandable 
> 
> Cheers,
> 
> El 2022-01-24 14:58, egoitz--- via bind-users escribió: Hi Klaus, 
> 
> Thank you so much for your answer but when Bind deletes a key from a zone, if 
> I remember correctly, there should not be any rrsig still active, signed 
> previously by the deleted key. Isn't it?. So I assume in that case, I should 
> be doing it properly but still see these messages. 
> 
> Am I wrong Klaus in some statement?. If a ZSK is deleted (I'm not renewing 
> KSK at the moment) no RRSIG with that key should exist... 
> 
> Cheers!
> 
> El 2022-01-24 13:08, Klaus Darilion escribió: 
> 
> IIRC, Bind needs the key as long as there are signatures in the zone 
> generated by this key. After key deactivation I waited the RRSIG lifetime 
> before deleting them. 
> 
> regards 
> 
> Klaus 
> 
> VON: bind-users  IM AUFTRAG VON egoitz--- 
> via bind-users
> GESENDET: Montag, 24. Jänner 2022 13:00
> AN: bind-users@lists.isc.org
> BETREFF: Bind 9, dnssec, and .key .private files physical deletion after the 
> key id becomes deleted from zone (the key becomes outdated) 
> 
> Good morning, 
> 
> I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;"  and 
> "auto-dnssec maintain;" for that reason. 
> 
> I do the task of ensuring always are valid keys in the zone with an script 
> that generates them whenever is needed. All fine until here and all working. 
> 
> I have seen, that Bind logs in messages log file sometimes the following 
> error logs : 
> 
> _dns_dnssec_keylistfromrdataset: error reading 
> /xxx/xxx/xxx/xx-domain/named.aaa/aaa.xx.+008+41919.private: file not found_ 
> 
> That "file not found" is due to a rename of ".key" and ".private" files to 
> ".key-OLD" and ".private-OLD". 
> 
> I did the rename, because I have seen that the ZSK key 41919 was set to be 
> deleted (and obviously always renamed after that deletion date) from the 
> zone, so I renamed the ".key" and ".private" files to ".key-OLD" and 
> ".private-OLD". 
> 
> I do this rename, because this way my key checking script differentiates, any 
> needed (in effect) key with the "supposedly" (I say supposedly because I 
> would have said that Bind should not be using nowadays that non finding files 
> for nothing!) non needed keys, in order to check that each zone, has always 
> the needed keys for keeping properly signed by Bind (else it would generate 
> them). 
> 
> As I previously commented, I check with a script the existence of all needed 
> keys for

Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
I think the problem is that if you do a : 

dig +multi @dnssecserver thedomain.thetld dnskey +dnssec | grep 44526 

You then see still that key id exists in DNSKEY records (and an RRSIG of
that ZSK, the 44526, but outdated). 

But I don't really understand why because you see the delete date of
44526 is very old 

Anyway that could explain the error : "dns_dnssec_keylistfromrdataset:
error reading .private: File not found", because it seems Bind
source code, checks the DNSKEY and later tries to load that keys. As the
files for keyid 44526 don't exist, that could (are renamed) that could
explain the error. 

But why has this happened??. Sometime ago, it happened to me that in
this machine (it's more than nothing a learning machine), the ZSK got
outdated because the script in charge of renewing the zsk was stopped.
So the only supposed valid key could have been in that moment the KSK
(which does not get expired). Could perhaps, those ZSK become
everlasting or similar, although in the file the date sais it's totally
outdated 

I can't understand what's happening there... 

Regards,

El 2022-01-24 15:04, ego...@ramattack.net escribió:

> In fact... in a domain for whom I have seen these errors, it's arguing about 
> key id 44526 (it's private file) saying "File not found". But if I perform an 
> axfr request of the signed zone with pipe grep the key id, no matches 
> appear... so should not exist rrsigs for that key 
> 
> These are the contents of a cat of the private file I have renamed to 
> samename.private-OLD : 
> 
> Created: 20211031230338
> Publish: 2020220241
> Activate: 2020220341
> Inactive: 20211215230338
> Delete: 20211217230338 
> 
> Not understandable 
> 
> Cheers,
> 
> El 2022-01-24 14:58, egoitz--- via bind-users escribió: Hi Klaus, 
> 
> Thank you so much for your answer but when Bind deletes a key from a zone, if 
> I remember correctly, there should not be any rrsig still active, signed 
> previously by the deleted key. Isn't it?. So I assume in that case, I should 
> be doing it properly but still see these messages. 
> 
> Am I wrong Klaus in some statement?. If a ZSK is deleted (I'm not renewing 
> KSK at the moment) no RRSIG with that key should exist... 
> 
> Cheers!
> 
> El 2022-01-24 13:08, Klaus Darilion escribió: 
> 
> IIRC, Bind needs the key as long as there are signatures in the zone 
> generated by this key. After key deactivation I waited the RRSIG lifetime 
> before deleting them. 
> 
> regards 
> 
> Klaus 
> 
> VON: bind-users  IM AUFTRAG VON egoitz--- 
> via bind-users
> GESENDET: Montag, 24. Jänner 2022 13:00
> AN: bind-users@lists.isc.org
> BETREFF: Bind 9, dnssec, and .key .private files physical deletion after the 
> key id becomes deleted from zone (the key becomes outdated) 
> 
> Good morning, 
> 
> I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;"  and 
> "auto-dnssec maintain;" for that reason. 
> 
> I do the task of ensuring always are valid keys in the zone with an script 
> that generates them whenever is needed. All fine until here and all working. 
> 
> I have seen, that Bind logs in messages log file sometimes the following 
> error logs : 
> 
> _dns_dnssec_keylistfromrdataset: error reading 
> /xxx/xxx/xxx/xx-domain/named.aaa/aaa.xx.+008+41919.private: file not found_ 
> 
> That "file not found" is due to a rename of ".key" and ".private" files to 
> ".key-OLD" and ".private-OLD". 
> 
> I did the rename, because I have seen that the ZSK key 41919 was set to be 
> deleted (and obviously always renamed after that deletion date) from the 
> zone, so I renamed the ".key" and ".private" files to ".key-OLD" and 
> ".private-OLD". 
> 
> I do this rename, because this way my key checking script differentiates, any 
> needed (in effect) key with the "supposedly" (I say supposedly because I 
> would have said that Bind should not be using nowadays that non finding files 
> for nothing!) non needed keys, in order to check that each zone, has always 
> the needed keys for keeping properly signed by Bind (else it would generate 
> them). 
> 
> As I previously commented, I check with a script the existence of all needed 
> keys for each domain. Obviuosly, it's not the same checking a couple of ZSK 
> or just one ZSK and a KSK (per domain), than them plus all outdated keys that 
> each month become outdated. 
> 
> So, how many time should I wait in order to rename that files?. Should I 
> handle them with another dnssec-__ command instead of renaming?. All 
> seems to be working well but I see these errors and was won

Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
In fact... in a domain for whom I have seen these errors, it's arguing
about key id 44526 (it's private file) saying "File not found". But if I
perform an axfr request of the signed zone with pipe grep the key id, no
matches appear... so should not exist rrsigs for that key 

These are the contents of a cat of the private file I have renamed to
samename.private-OLD : 

Created: 20211031230338
Publish: 2020220241
Activate: 2020220341
Inactive: 20211215230338
Delete: 20211217230338 

Not understandable 

Cheers,

El 2022-01-24 14:58, egoitz--- via bind-users escribió:

> Hi Klaus, 
> 
> Thank you so much for your answer but when Bind deletes a key from a zone, if 
> I remember correctly, there should not be any rrsig still active, signed 
> previously by the deleted key. Isn't it?. So I assume in that case, I should 
> be doing it properly but still see these messages. 
> 
> Am I wrong Klaus in some statement?. If a ZSK is deleted (I'm not renewing 
> KSK at the moment) no RRSIG with that key should exist... 
> 
> Cheers!
> 
> El 2022-01-24 13:08, Klaus Darilion escribió:
> 
>> IIRC, Bind needs the key as long as there are signatures in the zone 
>> generated by this key. After key deactivation I waited the RRSIG lifetime 
>> before deleting them. 
>> 
>> regards 
>> 
>> Klaus 
>> 
>> VON: bind-users  IM AUFTRAG VON egoitz--- 
>> via bind-users
>> GESENDET: Montag, 24. Jänner 2022 13:00
>> AN: bind-users@lists.isc.org
>> BETREFF: Bind 9, dnssec, and .key .private files physical deletion after the 
>> key id becomes deleted from zone (the key becomes outdated) 
>> 
>> Good morning, 
>> 
>> I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;"  and 
>> "auto-dnssec maintain;" for that reason. 
>> 
>> I do the task of ensuring always are valid keys in the zone with an script 
>> that generates them whenever is needed. All fine until here and all working. 
>> 
>> I have seen, that Bind logs in messages log file sometimes the following 
>> error logs : 
>> 
>> _dns_dnssec_keylistfromrdataset: error reading 
>> /xxx/xxx/xxx/xx-domain/named.aaa/aaa.xx.+008+41919.private: file not found_ 
>> 
>> That "file not found" is due to a rename of ".key" and ".private" files to 
>> ".key-OLD" and ".private-OLD". 
>> 
>> I did the rename, because I have seen that the ZSK key 41919 was set to be 
>> deleted (and obviously always renamed after that deletion date) from the 
>> zone, so I renamed the ".key" and ".private" files to ".key-OLD" and 
>> ".private-OLD". 
>> 
>> I do this rename, because this way my key checking script differentiates, 
>> any needed (in effect) key with the "supposedly" (I say supposedly because I 
>> would have said that Bind should not be using nowadays that non finding 
>> files for nothing!) non needed keys, in order to check that each zone, has 
>> always the needed keys for keeping properly signed by Bind (else it would 
>> generate them). 
>> 
>> As I previously commented, I check with a script the existence of all needed 
>> keys for each domain. Obviuosly, it's not the same checking a couple of ZSK 
>> or just one ZSK and a KSK (per domain), than them plus all outdated keys 
>> that each month become outdated. 
>> 
>> So, how many time should I wait in order to rename that files?. Should I 
>> handle them with another dnssec-__ command instead of renaming?. All 
>> seems to be working well but I see these errors and was wondering if I could 
>> improve the way of handling outdated keys. 
>> 
>> I have been taking a look at the source code of Bind (the tag of version I'm 
>> using), and I have seen that Bind seems not remove any of that key files 
>> when they become outdated. Or does it with some param?. I have not been able 
>> to find it. I have been taking a look too the ARM, but still no luck on 
>> finding the answers I was trying to. 
>> 
>> Any help very appreciated, 
>> 
>> Best regards,
> 
> ATENCION
> ATENCION
> ATENCION!!! Este correo se ha enviado desde fuera de la organizacion. No 
> pinche en los enlaces ni abra los adjuntos a no ser que reconozca el 
> remitente y sepa que el contenido es seguro.
> 
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://w

Re: AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Hi Klaus, 

Thank you so much for your answer but when Bind deletes a key from a
zone, if I remember correctly, there should not be any rrsig still
active, signed previously by the deleted key. Isn't it?. So I assume in
that case, I should be doing it properly but still see these messages. 

Am I wrong Klaus in some statement?. If a ZSK is deleted (I'm not
renewing KSK at the moment) no RRSIG with that key should exist... 

Cheers!

El 2022-01-24 13:08, Klaus Darilion escribió:

> IIRC, Bind needs the key as long as there are signatures in the zone 
> generated by this key. After key deactivation I waited the RRSIG lifetime 
> before deleting them. 
> 
> regards 
> 
> Klaus 
> 
> VON: bind-users  IM AUFTRAG VON egoitz--- 
> via bind-users
> GESENDET: Montag, 24. Jänner 2022 13:00
> AN: bind-users@lists.isc.org
> BETREFF: Bind 9, dnssec, and .key .private files physical deletion after the 
> key id becomes deleted from zone (the key becomes outdated) 
> 
> Good morning, 
> 
> I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;"  and 
> "auto-dnssec maintain;" for that reason. 
> 
> I do the task of ensuring always are valid keys in the zone with an script 
> that generates them whenever is needed. All fine until here and all working. 
> 
> I have seen, that Bind logs in messages log file sometimes the following 
> error logs : 
> 
> _dns_dnssec_keylistfromrdataset: error reading 
> /xxx/xxx/xxx/xx-domain/named.aaa/aaa.xx.+008+41919.private: file not found_ 
> 
> That "file not found" is due to a rename of ".key" and ".private" files to 
> ".key-OLD" and ".private-OLD". 
> 
> I did the rename, because I have seen that the ZSK key 41919 was set to be 
> deleted (and obviously always renamed after that deletion date) from the 
> zone, so I renamed the ".key" and ".private" files to ".key-OLD" and 
> ".private-OLD". 
> 
> I do this rename, because this way my key checking script differentiates, any 
> needed (in effect) key with the "supposedly" (I say supposedly because I 
> would have said that Bind should not be using nowadays that non finding files 
> for nothing!) non needed keys, in order to check that each zone, has always 
> the needed keys for keeping properly signed by Bind (else it would generate 
> them). 
> 
> As I previously commented, I check with a script the existence of all needed 
> keys for each domain. Obviuosly, it's not the same checking a couple of ZSK 
> or just one ZSK and a KSK (per domain), than them plus all outdated keys that 
> each month become outdated. 
> 
> So, how many time should I wait in order to rename that files?. Should I 
> handle them with another dnssec-__ command instead of renaming?. All 
> seems to be working well but I see these errors and was wondering if I could 
> improve the way of handling outdated keys. 
> 
> I have been taking a look at the source code of Bind (the tag of version I'm 
> using), and I have seen that Bind seems not remove any of that key files when 
> they become outdated. Or does it with some param?. I have not been able to 
> find it. I have been taking a look too the ARM, but still no luck on finding 
> the answers I was trying to. 
> 
> Any help very appreciated, 
> 
> Best regards,___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


AW: Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread Klaus Darilion via bind-users
IIRC, Bind needs the key as long as there are signatures in the zone generated 
by this key. After key deactivation I waited the RRSIG lifetime before deleting 
them.

regards
Klaus

Von: bind-users  Im Auftrag von egoitz--- via 
bind-users
Gesendet: Montag, 24. Jänner 2022 13:00
An: bind-users@lists.isc.org
Betreff: Bind 9, dnssec, and .key .private files physical deletion after the 
key id becomes deleted from zone (the key becomes outdated)


Good morning,



I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;"  and 
"auto-dnssec maintain;" for that reason.

I do the task of ensuring always are valid keys in the zone with an script that 
generates them whenever is needed. All fine until here and all working.

I have seen, that Bind logs in messages log file sometimes the following error 
logs :



dns_dnssec_keylistfromrdataset: error reading 
/xxx/xxx/xxx/xx-domain/named.aaa/aaa.xx.+008+41919.private: file not found



That "file not found" is due to a rename of ".key" and ".private" files to 
".key-OLD" and ".private-OLD".

I did the rename, because I have seen that the ZSK key 41919 was set to be 
deleted (and obviously always renamed after that deletion date) from the zone, 
so I renamed the ".key" and ".private" files to ".key-OLD" and ".private-OLD".

I do this rename, because this way my key checking script differentiates, any 
needed (in effect) key with the "supposedly" (I say supposedly because I would 
have said that Bind should not be using nowadays that non finding files for 
nothing!) non needed keys, in order to check that each zone, has always the 
needed keys for keeping properly signed by Bind (else it would generate them).

As I previously commented, I check with a script the existence of all needed 
keys for each domain. Obviuosly, it's not the same checking a couple of ZSK or 
just one ZSK and a KSK (per domain), than them plus all outdated keys that each 
month become outdated.

So, how many time should I wait in order to rename that files?. Should I handle 
them with another dnssec-__ command instead of renaming?. All seems to be 
working well but I see these errors and was wondering if I could improve the 
way of handling outdated keys.

I have been taking a look at the source code of Bind (the tag of version I'm 
using), and I have seen that Bind seems not remove any of that key files when 
they become outdated. Or does it with some param?. I have not been able to find 
it. I have been taking a look too the ARM, but still no luck on finding the 
answers I was trying to.



Any help very appreciated,

Best regards,
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Bind 9, dnssec, and .key .private files physical deletion after the key id becomes deleted from zone (the key becomes outdated)

2022-01-24 Thread egoitz--- via bind-users
Good morning, 

I have a DNSSEC "bump in wire" server, which uses "inline-signing yes;" 
and "auto-dnssec maintain;" for that reason. 

I do the task of ensuring always are valid keys in the zone with an
script that generates them whenever is needed. All fine until here and
all working. 

I have seen, that Bind logs in messages log file sometimes the following
error logs : 

_dns_dnssec_keylistfromrdataset: error reading
/xxx/xxx/xxx/xx-domain/named.aaa/aaa.xx.+008+41919.private: file not
found_ 

That "file not found" is due to a rename of ".key" and ".private" files
to ".key-OLD" and ".private-OLD". 

I did the rename, because I have seen that the ZSK key 41919 was set to
be deleted (and obviously always renamed after that deletion date) from
the zone, so I renamed the ".key" and ".private" files to ".key-OLD" and
".private-OLD". 

I do this rename, because this way my key checking script
differentiates, any needed (in effect) key with the "supposedly" (I say
supposedly because I would have said that Bind should not be using
nowadays that non finding files for nothing!) non needed keys, in order
to check that each zone, has always the needed keys for keeping properly
signed by Bind (else it would generate them). 

As I previously commented, I check with a script the existence of all
needed keys for each domain. Obviuosly, it's not the same checking a
couple of ZSK or just one ZSK and a KSK (per domain), than them plus all
outdated keys that each month become outdated. 

So, how many time should I wait in order to rename that files?. Should I
handle them with another dnssec-__ command instead of renaming?. All
seems to be working well but I see these errors and was wondering if I
could improve the way of handling outdated keys. 

I have been taking a look at the source code of Bind (the tag of version
I'm using), and I have seen that Bind seems not remove any of that key
files when they become outdated. Or does it with some param?. I have not
been able to find it. I have been taking a look too the ARM, but still
no luck on finding the answers I was trying to. 

Any help very appreciated, 

Best regards,___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: debian11 + bind-9.16.15 + dnssec-policy = lost zonefiles + crashes

2021-08-16 Thread Matthijs Mekking




On 16-08-2021 11:22, raf via bind-users wrote:

On Mon, Aug 16, 2021 at 10:32:35AM +0200, Matthijs Mekking  
wrote:


Hi,

On 16-08-2021 04:28, raf via bind-users wrote:

On Sun, Aug 15, 2021 at 10:35:27PM +1000, raf  wrote:

...


So it's looking good and I'm happy now. But how long
after the zone has been signed can I expect to see
CDS/CDNSKEY RRs appear? Why aren't they created at
the same time as the DNSKEY RRs? I assume there's
a good reason but I can't think what it is.


First the RRsets with signatures need to be in the zone long enough that any
cached unsigned RRsets in resolver's caches have expired.

If you call 'rndc dnssec -status ' you might see that the "zone
rrsigs" are still in the "rumoured" state. Once they are omnipresent, the DS
may be submitted and that is the time when the corresponding CDS/CDNSKEY
records will be published.


Thanks! That makes much sense. I was thinking that it
would be OK to publish the DS sooner when the zone is
signed for the first time. But I get it. I'll trust
bind's sense of timing and be patient. :-)


It is 99% of the time, but there will be corner cases (and dragons).
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: debian11 + bind-9.16.15 + dnssec-policy = lost zonefiles + crashes

2021-08-16 Thread raf via bind-users
On Mon, Aug 16, 2021 at 10:32:35AM +0200, Matthijs Mekking  
wrote:

> Hi,
> 
> On 16-08-2021 04:28, raf via bind-users wrote:
> > On Sun, Aug 15, 2021 at 10:35:27PM +1000, raf  wrote:
> ...
> > 
> > So it's looking good and I'm happy now. But how long
> > after the zone has been signed can I expect to see
> > CDS/CDNSKEY RRs appear? Why aren't they created at
> > the same time as the DNSKEY RRs? I assume there's
> > a good reason but I can't think what it is.
> 
> First the RRsets with signatures need to be in the zone long enough that any
> cached unsigned RRsets in resolver's caches have expired.
> 
> If you call 'rndc dnssec -status ' you might see that the "zone
> rrsigs" are still in the "rumoured" state. Once they are omnipresent, the DS
> may be submitted and that is the time when the corresponding CDS/CDNSKEY
> records will be published.

Thanks! That makes much sense. I was thinking that it
would be OK to publish the DS sooner when the zone is
signed for the first time. But I get it. I'll trust
bind's sense of timing and be patient. :-)

cheers,
raf

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: debian11 + bind-9.16.15 + dnssec-policy = lost zonefiles + crashes

2021-08-16 Thread Matthijs Mekking

Hi,

On 16-08-2021 04:28, raf via bind-users wrote:

On Sun, Aug 15, 2021 at 10:35:27PM +1000, raf  wrote:


...


So it's looking good and I'm happy now. But how long
after the zone has been signed can I expect to see
CDS/CDNSKEY RRs appear? Why aren't they created at
the same time as the DNSKEY RRs? I assume there's
a good reason but I can't think what it is.


First the RRsets with signatures need to be in the zone long enough that 
any cached unsigned RRsets in resolver's caches have expired.


If you call 'rndc dnssec -status ' you might see that the "zone 
rrsigs" are still in the "rumoured" state. Once they are omnipresent, 
the DS may be submitted and that is the time when the corresponding 
CDS/CDNSKEY records will be published.




Also, please document the dangers of putting a
dnssec-policy usage directive in the options {} stanza
(unless something signficant has changed since version
9.16.15, and bind now knows not to sign zones that
really shouldn't be signed locally - but even if that's
the case, you could document what version that changed in).


That's a good addition. There are a bunch of other suggestions to 
improve the documentation that I am planning to make and I'll add this 
suggestion to the list. Thanks.




Thanks again for making DNSSEC so easy to implement
(as long as you avoid classic rookie errors). :-)


Thanks for trying it out and reporting back, this way we can improve it 
even more.


Best regards,

Matthijs




cheers,
raf

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: debian11 + bind-9.16.15 + dnssec-policy = lost zonefiles + crashes

2021-08-15 Thread raf via bind-users
On Sun, Aug 15, 2021 at 10:35:27PM +1000, raf  wrote:

> But the real problem is that bind crashed, and dumped
> core, and couldn't start at all. There were a hectic
> few minutes there. :-) I deleted the coredump and the
> key files, and the .jnl files, restored backup
> zonefiles, updated the serials to be greater than that
> of the new DNSSEC signed zones, and then bind was able
> to start again.
> 
> Does anyone have any idea why bind-6.19.15 would have
> crashed repeatedly?

I've had a sleep, looked in the logs, and found this:

  general: notice: all zones loaded
  general: notice: running
  general: critical: rbtdb.c:6780: REQUIRE(((rbtnode->nsec == 
DNS_RBT_NSEC_NSEC3 && (rdataset->type ==
((dns_rdatatype_t)dns_rdatatype_nsec3) || rdataset->covers == 
((dns_rdatatype_t)dns_rdatatype_nsec3)))
|| (rbtnode->nsec != DNS_RBT_NSEC_NSEC3 && rdataset->type != 
((dns_rdatatype_t)dns_rdatatype_nsec3) &&
rdataset->covers != ((dns_rdatatype_t)dns_rdatatype_nsec3 failed, back 
trace
  general: critical: #0 0x558ce49ffeed in ??
  general: critical: #1 0x7fd079be6d9a in ??
  general: critical: #2 0x7fd079d7f73c in ??
  general: critical: #3 0x7fd079e45680 in ??
  general: critical: #4 0x7fd079c1b720 in ??
  general: critical: #5 0x7fd079c20f52 in ??
  general: critical: #6 0x7fd07995cea7 in ??
  general: critical: #7 0x7fd079590def in ??
  general: critical: exiting (due to assertion failure)

That assertion failed 13 times before I cleaned up.

Perhaps this is an old bug that's been fixed by now.

The only problems logged in the lead up to these
assertion failures were permission errors trying to
create jnl files in /etc/bind for the zones that
shouldn't have been signed anyway, e.g.:

  general: error: /etc/bind/db.empty.jnl: create: permission denied
  general: error: /etc/bind/db.255.jnl: create: permission denied

AppArmor prevented it, but the directory permissions
would have also prevented it (drwxr-sr-x root bind).

I'm convinced that the dnssec-policy usage directive
doesn't belong in the options {} stanza, and should
only appear in zone {} stanzas.

As for testing that approach on a separate VM, the
behaviour is very different, and completely wonderful.
Instead of overwriting my source zone files and then
crashing, it has created ZONE.jbk, ZONE.signed, and
ZONE.signed.jnl files, all of which are binary. But
last night, I definitely saw the overwritten ZONE files
as a text version of the signed zone. Wierd. Never
mind.

So it's looking good and I'm happy now. But how long
after the zone has been signed can I expect to see
CDS/CDNSKEY RRs appear? Why aren't they created at
the same time as the DNSKEY RRs? I assume there's
a good reason but I can't think what it is.

Also, please document the dangers of putting a
dnssec-policy usage directive in the options {} stanza
(unless something signficant has changed since version
9.16.15, and bind now knows not to sign zones that
really shouldn't be signed locally - but even if that's
the case, you could document what version that changed in).

Thanks again for making DNSSEC so easy to implement
(as long as you avoid classic rookie errors). :-)

cheers,
raf

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: debian11 + bind-9.16.15 + dnssec-policy = lost zonefiles + crashes

2021-08-15 Thread Tony Finch
raf via bind-users  wrote:
>
> But that means that it applies to all of the zones in
> /etc/bind/named.conf.default-zones which is not helpful. It also applies
> to the zones in /etc/bind/zones.rfc1918 if that is included in
> /etc/bind/named.conf.local (which a comment there suggested). That's not
> helpful either.

A tangential point, but I think this kind of setup (with lots of empty
zones) isn't necessary, if you are doing DNSSEC validation and you turn on
synth-from-dnssec - much less configuration clutter.

> Can you sign 127.in-addr.arpa and 168.192.in-addr.arpa?

You can: it's harmless but pointless and wasteful.

> I've come to the conclusion that putting dnssec-policy in the options {}
> stanza, so that it applies to all zones, is a terrible idea. It only
> makes sense (to me) to add dnssec-policy to each individual (real)
> authoritative zone {} stanza.

It makes sense to configure dnssec-policy in one place if you have an
authoritative-only primary server, which is configured with just the zones
that it is signing. (The extra zones in the Debian config are only
suitable for a recursive server.)

> What I found more upsetting, was that my carefully crafted, well
> documented zonefiles in /var/cache/bind had been overwritten by bind so
> as to include the DNSSEC records. It might seem obvious to anyone who
> uses DNS updates that that was going to happen, but I wasn't expecting
> it. It would be great if the DNSSEC guide could be updated to mention
> that this happens, and include advice to keep your zonefile sources
> somewhere other than where bind looks for them.

Yes, this is a relatively common gotcha. You can avoid overwritten zone
files by turning on inline-signing mode, so that your source zone files
are separate from the signed zone files maintained by named. If your
configuration uses dynamic updates or DNSSEC then the zone files are
normally owned by named and will be rewritten, and you are right that
there isn't much warning of this in the documentation.

> But the real problem is that bind crashed, and dumped core, and couldn't
> start at all.

There should be something in the logs to indicate why this might have
happened; failing that a stack trace from the core dump would have been
helpful.

> I have a new question about the process of updating zonefiles when
> dnssec-policy is in use. From now on, I'll have my zonefile sources
> somewhere other than /var/cache/bind (e.g. /etc/bind/zone). When I make
> changes, I'll install them to /var/cache/bind and reload bind9. Bind9
> will replace them with the signed versions. Is it OK for me to modify my
> unsigned sources, install them over the top of bind's signed versions,
> and will bind happily recreate all of the DNSSEC records each time?

No, I'm afraid it's more complicated than that.

You can do what you suggest if the server uses inline-signing mode. If
not, your process will go wrong horribly: you need to use `rndc freeze`
and `rndc thaw` if you are manually editing a zone file that is owned by
named, BUT if you do that with a signed zone, you will lose all the
signatures and it will have to be re-signed from scratch. Not good.

Another alternative is to enable `update-policy local`, and use nsdiff and
nsupdate to make the live zone match your source files.
http://dotat.at/prog/nsdiff/

Tony.
-- 
f.anthony.n.finchhttps://dotat.at/
North Fitzroy, Sole: Westerly or northwesterly 4 to 6 veering
northerly or northwesterly 3 to 5. Rough becoming moderate. Showers
then fair. Good, occasionally moderate.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


debian11 + bind-9.16.15 + dnssec-policy = lost zonefiles + crashes

2021-08-15 Thread raf via bind-users
Hi,

I've just upgraded my bind9 server to debian-11 which
has bind-9.16.15. I've been looking forward to this. I
had my local dnssec-policy ("annual") all ready to go.
But it didn't go well at all.

For the first few seconds, I thought it was great. I
uncommented my new config to enable DNSSEC signing, and
the keys directory was full of new files, but there
were too many. There were key files for all of the
RFC1918 zones. I thought that can't be right.

I had put dnssec-policy "annual" in the options {}
stanza, so that it would apply to all zones. This is
suggested as a possibility in the DNSSEC guide and/or
the configuration reference.

But that means that it applies to all of the zones in
/etc/bind/named.conf.default-zones which is not
helpful. It also applies to the zones in
/etc/bind/zones.rfc1918 if that is included in
/etc/bind/named.conf.local (which a comment there
suggested). That's not helpful either. At least, I
can't see how. Can you sign 127.in-addr.arpa and
168.192.in-addr.arpa? Maybe this is a Debian package
issue. Maybe named.conf.default-zones isn't an
upstream thing. But it's good to be aware of when
writing the documentation.

I've come to the conclusion that putting dnssec-policy
in the options {} stanza, so that it applies to all
zones, is a terrible idea. It only makes sense (to me)
to add dnssec-policy to each individual (real)
authoritative zone {} stanza.

It would be great if the DNSSEC guide and the
configuration reference were updated to include a
warning about this.

But that was just a surprise, maybe wasteful, but
possibly harmless (although possibly not).

What I found more upsetting, was that my carefully
crafted, well documented zonefiles in /var/cache/bind
had been overwritten by bind so as to include the
DNSSEC records. It might seem obvious to anyone who
uses DNS updates that that was going to happen, but I
wasn't expecting it. It would be great if the DNSSEC
guide could be updated to mention that this happens,
and include advice to keep your zonefile sources
somewhere other than where bind looks for them.

I never received any indication when reading the
documentation about DNSSEC that this would happen. I
knew that bind would read in my zonefiles and construct
a signed version of it, but the documentation never
mentioned that that signed version would be written to
disk over my original source zonefiles. At least, I
never got that impression. Thank goodness for backups. :-)
I'll know for next time, and I'll restructure things,
but it would have been nice to be warned in advance
by the documentation.

But the real problem is that bind crashed, and dumped
core, and couldn't start at all. There were a hectic
few minutes there. :-) I deleted the coredump and the
key files, and the .jnl files, restored backup
zonefiles, updated the serials to be greater than that
of the new DNSSEC signed zones, and then bind was able
to start again.

Does anyone have any idea why bind-6.19.15 would have
crashed repeatedly? Here's the subset of the
config that I think could be relevant:

  options
  {
allow-recursion { localhost; };
dnssec-validation auto;
directory "/var/cache/bind";
key-directory "/var/cache/bind/keys";
dnssec-policy "annual"; # I'm moving this away!
  };

  dnssec-policy "annual"
  {
keys
{
ksk key-directory lifetime 366d algorithm ecdsap256sha256;
zsk key-directory lifetime 61d algorithm ecdsap256sha256;
};
nsec3param iterations 5 optout no salt-length 16;
publish-safety 7d;
retire-safety 7d;
purge-keys 90d;
signatures-validity-dnskey 14d;
signatures-validity 14d;
signatures-refresh 7d;
dnskey-ttl 1d;
max-zone-ttl 1d;
parent-ds-ttl 1d;
zone-propagation-delay 300;
parent-propagation-delay 1d;
  };

Might it just be because the RFC1918 zones were signed
and therefore invalid?

I'll try a more gradual approach on a separate test VM
and see how things go. But any advice would be greatly
appreciated. I want to be able to keep using whatever
version of bind9 is on debian stable. So workarounds
that don't involve an upgrade would be appreciated.

Hmm, on a separate VM just adding dnssec-policy "annual"
to one zone {} statement, and reloading, nothing happens.
I should come back to this tomorrow.

I have a new question about the process of updating
zonefiles when dnssec-policy is in use. From now on,
I'll have my zonefile sources somewhere other than
/var/cache/bind (e.g. /etc/bind/zone). When I make
changes, I'll install them to /var/cache/bind and
reload bind9. Bind9 will replace them with the signed
versions. Is it OK for me to modify my unsigned
sources, install them over the top of bind's signed
versions, and will bind happily recreate all of the
DNSSEC records each time? Is that what's expected? That
bind and I keep overwriting each other's zone files?

Th

Re: DHCPD - BIND DDNS: dnssec-keygen hmac-md5 removed

2020-04-13 Thread Bob Harold
I would suggest:

   tsig-keygen   your-key-name

It does not need any options, the defaults are fine.

-- 
Bob Harold


On Fri, Apr 10, 2020 at 7:52 PM moo can via bind-users <
bind-users@lists.isc.org> wrote:

> Hello,
>
> For educational purpose I need to setup an DDNS between DCHPD and BIND.
>
> Everywhere, debian, zytrax, freeipa, veritas ... use dnssec-keygen.
>
> Zytrax:
> dnssec-keygen -a HMAC-SHA512 -b 512 -n HOST keyname
>
> Veritas:
> dnssec-keygen -a HMAC-MD5 -b 128 -n HOST example.com.
>
> Debian:
> dnssec-keygen -a HMAC-MD5 -b 128 -r /dev/urandom -n USER DDNS_UPDATE
>
> HMAC-* support seems to have been removed from dnssec-keygen
> https://gitlab.isc.org/fanf/bind9/commit/80788e72d0698f93e92a0e8f1aa60ff982623997
>
> It seems we need to use tsig-keygen but it is not clear.
>
> I try to follow this guide from debian 
> https://wiki.debian.org/DDNS#How_to_set_up_DDNS as example but there is no -n 
> USER or -n HOST option with tsig-keygen.
>
> I do not find any clear example.
>
> Thanks you in advance for your help.
>
> Kind Regards
> Fabien
>
>
>
>
>
>
>
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> unsubscribe from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DHCPD - BIND DDNS: dnssec-keygen hmac-md5 removed

2020-04-12 Thread Mark Andrews
Use tsig-keygen. 

-- 
Mark Andrews

> On 11 Apr 2020, at 09:52, moo can via bind-users  
> wrote:
> 
> 
> Hello,
> 
> For educational purpose I need to setup an DDNS between DCHPD and BIND.
> 
> Everywhere, debian, zytrax, freeipa, veritas ... use dnssec-keygen.
> Zytrax: 
> dnssec-keygen -a HMAC-SHA512 -b 512 -n HOST keyname
> 
> Veritas: 
> dnssec-keygen -a HMAC-MD5 -b 128 -n HOST example.com.
> 
> Debian: 
> dnssec-keygen -a HMAC-MD5 -b 128 -r /dev/urandom -n USER DDNS_UPDATE
> 
> HMAC-* support seems to have been removed from dnssec-keygen
> https://gitlab.isc.org/fanf/bind9/commit/80788e72d0698f93e92a0e8f1aa60ff982623997
> 
> It seems we need to use tsig-keygen but it is not clear.
> 
> I try to follow this guide from debian 
> https://wiki.debian.org/DDNS#How_to_set_up_DDNS as example but there is no -n 
> USER or -n HOST option with tsig-keygen.
> 
> I do not find any clear example.
> 
> Thanks you in advance for your help.
> 
> Kind Regards
> Fabien
> 
> 
> 
> 
> 
> 
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DHCPD - BIND DDNS: dnssec-keygen hmac-md5 removed

2020-04-10 Thread moo can via bind-users
Hello,
For educational purpose I need to setup an DDNS between DCHPD and BIND.
Everywhere, debian, zytrax, freeipa, veritas ... use dnssec-keygen.Zytrax: 
dnssec-keygen -a HMAC-SHA512 -b 512 -n HOST keyname

Veritas: 
dnssec-keygen -a HMAC-MD5 -b 128 -n HOST example.com.

Debian: 
dnssec-keygen -a HMAC-MD5 -b 128 -r /dev/urandom -n USER DDNS_UPDATE
HMAC-* support seems to have been removed from dnssec-keygen
https://gitlab.isc.org/fanf/bind9/commit/80788e72d0698f93e92a0e8f1aa60ff982623997

It seems we need to use tsig-keygen but it is not clear.

I try to follow this guide from debian 
https://wiki.debian.org/DDNS#How_to_set_up_DDNS as example but there is no -n 
USER or -n HOST option with tsig-keygen.

I do not find any clear example.

Thanks you in advance for your help.

Kind Regards
Fabien






___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Alan Clegg
On Nov 1, 2012, at 3:02 AM, Kobus Bensch kben...@fullnet.co.uk wrote:

 Thank you for this. Had a look and it seems fairly easy. Not sure if that is 
 a flippant remark. 

As the author of this document, I must say thanks.  Deploying DNSSEC is not 
hard.

It's the care and feeding after-the-fact (key rollover) that you must be 
extremely careful with.

 A question:  is implementing dnssec a good enough reason to abandon split 
 horizon DNS?

I'd find any excuse to abandon views/split-horizon.

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com





___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Kobus Bensch
Hi

Is that because split horizon doubles admin or because its bad all together?

I have been using split horizon for many years now and found it very useful. 
Any thoughts from any on the list would be most welcomed.

Kobus

- Original Message -
From: Alan Clegg a...@clegg.com
To: Kobus Bensch kben...@fullnet.co.uk
Cc: Feng He fen...@nsbeta.info, bind-users@lists.isc.org
Sent: Thursday, 1 November, 2012 11:08:10 AM
Subject: Re: BIND and DNSSEC

On Nov 1, 2012, at 3:02 AM, Kobus Bensch kben...@fullnet.co.uk wrote:

 Thank you for this. Had a look and it seems fairly easy. Not sure if that is 
 a flippant remark. 

As the author of this document, I must say thanks.  Deploying DNSSEC is not 
hard.

It's the care and feeding after-the-fact (key rollover) that you must be 
extremely careful with.

 A question:  is implementing dnssec a good enough reason to abandon split 
 horizon DNS?

I'd find any excuse to abandon views/split-horizon.

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com






-- 
Fullnet Solutions Limited
7 Marlborough Close
Maidenhead
Berkshire
SL6 4LP
United Kingdom

Telephone: +44 (07703) 503 733

Kobus Bensch: kben...@fullnet.co.uk

Information: i...@fullnet.co.uk

WWW: http://www.fullnet.co.uk

Registered in England  Wales.
Company Number: 3568937

VAT registration number: UK 714 7309 42

E  O.E. All prices exclude VAT  Carriage unless otherwise specified.

This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the system administrator by 
emailing ad...@fullnet.co.uk with the subject eMail Confidentiality Query! . 
The content of this email does not necessarily reflect the views or opinions of 
Fullnet Solutions Limited. If you have any queries or complaints please email 
i...@fullnet.co.uk with the subject eMail Comment/Complaint Query!.
This footnote also confirms that this email message has been scanned for the 
presence of computer viruses. Fullnet Solutions Limited can however not be held 
responsible for any virus infections on the recipients or any other systems. 
For more information regarding the solutions Fullnet has to offer please email 
i...@fullnet.co.uk with the subject Sales Query!.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Alan Clegg

On Nov 1, 2012, at 7:14 AM, Kobus Bensch kben...@fullnet.co.uk wrote:

 Is that because split horizon doubles admin or because its bad all together?
 
 I have been using split horizon for many years now and found it very useful. 
 Any thoughts from any on the list would be most welcomed.

Crafted for a private reply, but being re-used here:

There are places that views/split-horizon fit the model that has been put into 
place.  It does, however, break the one-question, one-answer concept that was 
foundational for DNS.

My recommendation is that for internal addressing, a separate zone be created 
that serves that address space.  You gain a number of things from this, 
including easier debugging and better data security (no-longer are you 
concerned about exactly what clients are seeing at www.internal.example.com 
since you know that the only people able to resolve/route 
internal.example.com are the ones that should be able to).

The problem lies in that over the years, people (usually the higher-ups) have 
been trained (by us, the in-the-trench guys) that www.example.com can be one 
thing internally and something else externally, or that their printer really 
_should_ be named myprinter.example.com and not myprinter.internal.example.com.

All the best,
AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com





___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Tony Finch
Feng He fen...@nsbeta.info wrote:

 Take a look at:
 http://www.dnssec.lk/docs/DNSSEC_in_6_minutes.pdf

I recommend using auto-dnssec maintain so named keeps the zone signed,
instead of dnssec-signzone.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Kobus Bensch
Thanks. All makes sense and definitely something to think about in the new 
network design.

Also wanted to say, I did like the doc and will be using that, but as you say, 
will make particular note about the maintenance side of things.

Thanks

Kobus

- Original Message -
From: Alan Clegg a...@clegg.com
To: Kobus Bensch kben...@fullnet.co.uk
Cc: bind-users@lists.isc.org
Sent: Thursday, 1 November, 2012 11:26:31 AM
Subject: Re: BIND and DNSSEC


On Nov 1, 2012, at 7:14 AM, Kobus Bensch kben...@fullnet.co.uk wrote:

 Is that because split horizon doubles admin or because its bad all together?
 
 I have been using split horizon for many years now and found it very useful. 
 Any thoughts from any on the list would be most welcomed.

Crafted for a private reply, but being re-used here:

There are places that views/split-horizon fit the model that has been put into 
place.  It does, however, break the one-question, one-answer concept that was 
foundational for DNS.

My recommendation is that for internal addressing, a separate zone be created 
that serves that address space.  You gain a number of things from this, 
including easier debugging and better data security (no-longer are you 
concerned about exactly what clients are seeing at www.internal.example.com 
since you know that the only people able to resolve/route 
internal.example.com are the ones that should be able to).

The problem lies in that over the years, people (usually the higher-ups) have 
been trained (by us, the in-the-trench guys) that www.example.com can be one 
thing internally and something else externally, or that their printer really 
_should_ be named myprinter.example.com and not myprinter.internal.example.com.

All the best,
AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com






-- 
Fullnet Solutions Limited
7 Marlborough Close
Maidenhead
Berkshire
SL6 4LP
United Kingdom

Telephone: +44 (07703) 503 733

Kobus Bensch: kben...@fullnet.co.uk

Information: i...@fullnet.co.uk

WWW: http://www.fullnet.co.uk

Registered in England  Wales.
Company Number: 3568937

VAT registration number: UK 714 7309 42

E  O.E. All prices exclude VAT  Carriage unless otherwise specified.

This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the system administrator by 
emailing ad...@fullnet.co.uk with the subject eMail Confidentiality Query! . 
The content of this email does not necessarily reflect the views or opinions of 
Fullnet Solutions Limited. If you have any queries or complaints please email 
i...@fullnet.co.uk with the subject eMail Comment/Complaint Query!.
This footnote also confirms that this email message has been scanned for the 
presence of computer viruses. Fullnet Solutions Limited can however not be held 
responsible for any virus infections on the recipients or any other systems. 
For more information regarding the solutions Fullnet has to offer please email 
i...@fullnet.co.uk with the subject Sales Query!.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Alan Clegg

On Nov 1, 2012, at 7:34 AM, Tony Finch d...@dotat.at wrote:

 I recommend using auto-dnssec maintain so named keeps the zone signed,
 instead of dnssec-signzone.

I do as well, and this will be documented in the next version of this document.

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com





___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Alan Clegg

On Nov 1, 2012, at 7:34 AM, Tony Finch d...@dotat.at wrote:

 I recommend using auto-dnssec maintain so named keeps the zone signed,
 instead of dnssec-signzone.

I do as well, and this will be documented in the next version of this document.

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com







signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: BIND and DNSSEC

2012-11-01 Thread Alan Clegg

On Nov 1, 2012, at 7:34 AM, Tony Finch d...@dotat.at wrote:

 I recommend using auto-dnssec maintain so named keeps the zone signed,
 instead of dnssec-signzone.

I do as well, and this will be documented in the next version of this document.

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com







signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: BIND and DNSSEC

2012-11-01 Thread Chris Thompson

On Nov 1 2012, Jan-Piet Mens wrote:


I do as well, and this will be documented in the next version of
this document.


I believe you've mentioned that here before. Several times. Today. ;-)


 What I tell you three times is true.”

 The Bellman, pp Lewis Carroll

--
Chris Thompson
Email: c...@cam.ac.uk
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: BIND and DNSSEC

2012-11-01 Thread Sten Carlsen


On 01/11/12 12:26, Alan Clegg wrote:

On Nov 1, 2012, at 7:14 AM, Kobus Bensch kben...@fullnet.co.uk wrote:


Is that because split horizon doubles admin or because its bad all together?

I have been using split horizon for many years now and found it very useful. 
Any thoughts from any on the list would be most welcomed.

Crafted for a private reply, but being re-used here:

There are places that views/split-horizon fit the model that has been put into place.  It 
does, however, break the one-question, one-answer concept that was 
foundational for DNS.

My recommendation is that for internal addressing, a separate zone be created that serves that 
address space.  You gain a number of things from this, including easier debugging and better data security 
(no-longer are you concerned about exactly what clients are seeing at www.internal.example.com 
since you know that the only people able to resolve/route internal.example.com are the ones that 
should be able to).
I believe that thinking is no longer valid with laptops moving around. I 
assume you don't have enough public addresses to give everything its own 
address, I don't, my servers work through a NAT. They are behind NAT 
partly for lack of IPs and partly because I want to keep their other 
ports away from accidental exposure to script kiddies, I know more 
concerted efforts will do more harm.


The typical server setup (for own servers) is that one name is used for 
setting up e.g. the mail server, the ideal situation for everybody is 
that whether I am in house or visiting you, if I have any internet 
access, I can read and send mail.


Now if there is an internal zone with a different name, how will you set 
up the mail client? internal name is not accessible from outside and 
external name is not present in internal name space. - two mail 
clients? changing setups when moving between networks?


My solution is to have the exactly same names internally and externally, 
any client SW will just ask for the same server but the IP will differ 
with the network segment.


IPv6 will change all that of course.

The problem lies in that over the years, people (usually the higher-ups) have been 
trained (by us, the in-the-trench guys) that www.example.com can be one thing 
internally and something else externally, or that their printer really _should_ be named 
myprinter.example.com and not myprinter.internal.example.com.

All the best,
AlanC


--
Best regards

Sten Carlsen

No improvements come from shouting:

   MALE BOVINE MANURE!!!

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: BIND and DNSSEC

2012-11-01 Thread Alan Clegg

On Nov 1, 2012, at 7:45 AM, Alan Clegg a...@clegg.com wrote:

 
 On Nov 1, 2012, at 7:34 AM, Tony Finch d...@dotat.at wrote:
 
 I recommend using auto-dnssec maintain so named keeps the zone signed,
 instead of dnssec-signzone.
 
 I do as well, and this will be documented in the next version of this 
 document.

Sorry for the spammage.  Bad failure mode of mail.app under OSX, it seems.  :(

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com







signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: BIND and DNSSEC

2012-11-01 Thread Barry S. Finkel

On 11/1/2012 3:31 PM, Sten Carlsen st...@s-carlsen.dk wrote:

The typical server setup (for own servers) is that one name is used for
setting up e.g. the mail server, the ideal situation for everybody is
that whether I am in house or visiting you, if I have any internet
access, I can read and send mail.

Now if there is an internal zone with a different name, how will you set
up the mail client? internal name is not accessible from outside and
external name is not present in internal name space. - two mail
clients? changing setups when moving between networks?

In this case, either 1) you have one mail server at the external border
and one mail server internal, or 2) the same MX record in the external
and internal view. You can have a common records file that you
$INCLUDE in both views.
--Barry Finkel
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND and DNSSEC

2012-11-01 Thread Sten Carlsen

On 02/11/12 2:08, Barry S. Finkel wrote:
 On 11/1/2012 3:31 PM, Sten Carlsen st...@s-carlsen.dk wrote:
 The typical server setup (for own servers) is that one name is used for
 setting up e.g. the mail server, the ideal situation for everybody is
 that whether I am in house or visiting you, if I have any internet
 access, I can read and send mail.

 Now if there is an internal zone with a different name, how will you set
 up the mail client? internal name is not accessible from outside and
 external name is not present in internal name space. - two mail
 clients? changing setups when moving between networks?
 In this case, either 1) you have one mail server at the external border
 and one mail server internal, or 2) the same MX record in the external
 and internal view. You can have a common records file that you
 $INCLUDE in both views.
 --Barry Finkel

This will work for smtp service, I see a host of interesting issues with
IMAP service. Two mail servers that must be synchronized within a
minute, I don't think that is standard.

The simple solution (small scale) is to have one server, sitting
internally or in DMZ, the internal address record points to the
192.168.x.x address and the external address record points to the public
address of the router, which then has a virtual server set up for it.
This works flawless, I never consider if I am in or out of the house.

-- 
Best regards

Sten Carlsen

No improvements come from shouting:
   MALE BOVINE MANURE!!!

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

BIND and DNSSEC

2012-10-31 Thread Kobus Bensch
Hi 

Can anybody point me in the direction of a good guide on setting up BIND split 
horizon DNS and DNSSEC? 

Thanks in advance 

Kobus 

-- 


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind 9.7, dnssec and multiple key directories and resalt NSEC3

2010-06-04 Thread Phil Mayers

On 04/06/10 11:11, Tim Verhoeven wrote:

Hi,

I'm currently testing the automatic signing for DNSSEC present in Bind
9.7. I'm currently using Bind 9.7.0 and I have 2 questions.

The first one, can I configure multiple key directories? The reasoning
for this is that I would like to seperate the KSK's from the ZSK's.
And this to be able to not have the KSK's present all the time by
putting them on a removable media. For the ZSK's I have no choice
since I will be doing dynamic updates.
Or are there other means to do this except from adding and removing
the KSK's when needed ?


Symlinks to the KSK in another directory?
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: bind 9.7, dnssec and multiple key directories and resalt NSEC3

2010-06-04 Thread Tim Verhoeven
On Fri, Jun 4, 2010 at 1:18 PM, Phil Mayers p.may...@imperial.ac.uk wrote:
 On 04/06/10 11:11, Tim Verhoeven wrote:

 I'm currently testing the automatic signing for DNSSEC present in Bind
 9.7. I'm currently using Bind 9.7.0 and I have 2 questions.

 The first one, can I configure multiple key directories? The reasoning
 for this is that I would like to seperate the KSK's from the ZSK's.
 And this to be able to not have the KSK's present all the time by
 putting them on a removable media. For the ZSK's I have no choice
 since I will be doing dynamic updates.
 Or are there other means to do this except from adding and removing
 the KSK's when needed ?

 Symlinks to the KSK in another directory?

A good one, why haven't I thought of that myself ;-)

Thanks,
Tim

-- 
Tim Verhoeven - tim.verhoeven...@gmail.com - 0479 / 88 11 83

Hoping the problem  magically goes away  by ignoring it is the
microsoft approach to programming and should never be allowed.
(Linus Torvalds)
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: bind 9.7, dnssec and multiple key directories and resalt NSEC3

2010-06-04 Thread Casey Deccio
On Fri, Jun 4, 2010 at 3:11 AM, Tim Verhoeven tim.verhoeven...@gmail.comwrote:


 The second question. I've tried doing a resalt using dynamic updates
 but I can't get it to work. Just adding a new NSEC3PARAM RR crashes
 Bind and doing a delete and then a add (to replace the present RR)
 gives me a servfail but I see the updats in the log.
 What is the correct way to do a resalt when using automatic signing ?


This should work:

rndc freeze
dnssec-signzone ... # using same keys but with new NSEC3 salt
rndc reload
rndc thaw

Although, at least in earlier versions of BIND, if not all RRsets in the
zone are resigned with the resign (i.e., within interval specified with
-i), then the NSEC3 chain with the new salt is added to any existing NSEC3
chains.   There shouldn't be any ill effects from this, but it does increase
the size of the zone some.

Regards,
Casey
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind 9.7, dnssec and multiple key directories and resalt NSEC3

2010-06-04 Thread Evan Hunt
 The first one, can I configure multiple key directories? The reasoning
 for this is that I would like to seperate the KSK's from the ZSK's.

No, you can't... but that's an interesting idea.  Right now it's a single
key directory per zone.

 The second question. I've tried doing a resalt using dynamic updates
 but I can't get it to work. Just adding a new NSEC3PARAM RR crashes
 Bind and doing a delete and then a add (to replace the present RR)
 gives me a servfail but I see the updats in the log.
 What is the correct way to do a resalt when using automatic signing ?

The way it's supposed to work is: you add the new NSEC3PARAM record,
then wait for the new NSEC3 chain to be built.  The newly inserted record
will, at first, have its flags field set to a nonzero value; this
indicates that the chain isn't complete yet.  When the server is finished
building the chain, it updates the newly-added NSEC3PARAM record, and
zeroes the flags field.  At that point, it's safe to remove the old
NSEC3PARAM record, which will cause the server to remove the old NSEC3
chain.

If inserting a new NSEC3PARAM RR is crashing named, please file a bug
report.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: bind 9.7, dnssec and multiple key directories and resalt NSEC3

2010-06-04 Thread Casey Deccio
On Fri, Jun 4, 2010 at 9:10 AM, Evan Hunt e...@isc.org wrote:

 The way it's supposed to work is: you add the new NSEC3PARAM record,
 then wait for the new NSEC3 chain to be built.  The newly inserted record
 will, at first, have its flags field set to a nonzero value; this
 indicates that the chain isn't complete yet.  When the server is finished
 building the chain, it updates the newly-added NSEC3PARAM record, and
 zeroes the flags field.  At that point, it's safe to remove the old
 NSEC3PARAM record, which will cause the server to remove the old NSEC3
 chain.


This is a much more elegant solution... :)

Casey
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users