Re: How to introduce automatic signing for existing signed zones?

2022-11-08 Thread Niall O'Reilly

On 8 Nov 2022, at 7:54, Matthijs Mekking wrote:

Thanks for reporting back. This is an omission in our KB article that 
I will fix.


Thanks, Matthijs.
I think that will be useful.

Niall
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to introduce automatic signing for existing signed zones?

2022-11-07 Thread Matthijs Mekking

Niall,

Thanks for reporting back. This is an omission in our KB article that I 
will fix.


- Matthijs

On 07-11-2022 18:24, Niall O'Reilly wrote:

On 7 Nov 2022, at 11:40, Niall O'Reilly wrote:


Preparation:

- Set up minimal stand-alone instance of BIND9 named,
   configured with a **dnssec-policy** for each algorithm,
   matching properties of existing DNSSEC keys, and with
   `lifetime unlimited`;
- Deliver current key files and recently-signed copy of
   zone files to this instance.


I needed an additional stage of preparation, before delivering
the key files; specifically, I needed to edit the .private
files to 'Private-key-format: v1.3' and add missing lifecycle
metadata.

After doing this, named behaved exactly as expected.

Thanks, Matthijs, for steering me in the right direction,
and for being ready to give me additional help.

/Niall


--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to introduce automatic signing for existing signed zones?

2022-11-07 Thread Niall O'Reilly
On 7 Nov 2022, at 11:40, Niall O'Reilly wrote:

> Preparation:
>
> - Set up minimal stand-alone instance of BIND9 named,
>   configured with a **dnssec-policy** for each algorithm,
>   matching properties of existing DNSSEC keys, and with
>   `lifetime unlimited`;
> - Deliver current key files and recently-signed copy of
>   zone files to this instance.

I needed an additional stage of preparation, before delivering
the key files; specifically, I needed to edit the .private
files to 'Private-key-format: v1.3' and add missing lifecycle
metadata.

After doing this, named behaved exactly as expected.

Thanks, Matthijs, for steering me in the right direction,
and for being ready to give me additional help.

/Niall

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to introduce automatic signing for existing signed zones?

2022-11-07 Thread Niall O'Reilly

Thank you for your speedy response, Matthijs.

On 7 Nov 2022, at 13:10, Matthijs Mekking wrote:


Ignore that, I saw too late there were attachments.


Perhaps I ought to have mentioned them explicitly.

Are you able to share the public key and key state files with me so I 
can investigate why BIND thinks the existing keys cannot be used?


Off list, and PGP-protected, yes.

This will mean I'll end up having to change the parent DS RRs later on.
That seems a reasonable cost for getting to the root of the problem.

I have no key state files, except after starting named, and then only
for the RSA/SHA-256 and **newly-generated** ECDSA keys.  My current
signing process uses ldns-signzone, which seems not to use such files.


Also, the log file looks like an excerpt.


No; that's everything named, as configured, writes.


A full debug (level 3) log would be useful too.


I'll set up for that, and follow up off list.

Thanks and best regards,
Niall

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to introduce automatic signing for existing signed zones?

2022-11-07 Thread Matthijs Mekking

On 07-11-2022 14:04, Matthijs Mekking wrote:

Hi Niall,

You need to share the dnssec-policy for no8.be in order to investigate 
why it doesn't show the expected behavior, but I suspect that the policy 
did not match the properties for the existing DNSSEC keys completely.


Ignore that, I saw too late there were attachments.

Are you able to share the public key and key state files with me so I 
can investigate why BIND thinks the existing keys cannot be used?


Also, the log file looks like an excerpt. A full debug (level 3) log 
would be useful too.


Best regards,

Matthijs




Best regards,

Matthijs

On 07-11-2022 12:40, Niall O'Reilly wrote:

I have a couple of zones which I want to migrate from CLI-driven
signing to BIND9 automatic signing, while avoiding any change to
the respective parent-zone DS RR.

Status quo ante:

- https://dnsviz.net/d/no8.be/dnssec/
   separate KSK, ZSK; both using alg 13
- https://dnsviz.net/d/jamm.ie/dnssec/
   2048-bit KSK, 2x 1024-bit ZSKs (live and spare); all using alg 8

Preparation:

- Set up minimal stand-alone instance of BIND9 named,
   configured with a **dnssec-policy** for each algorithm,
   matching properties of existing DNSSEC keys, and with
   `lifetime unlimited`;
- Deliver current key files and recently-signed copy of
   zone files to this instance.

Expected behaviour on starting named:

- Zones are loaded;
- Spare ZSK for jamm.ie is retired;
- Other keys for each zone are accepted and retained;
- A CDS RR is generated for each zone, matching the current DS RR.

Observed behaviour:

- `named -v` shows `BIND 9.18.8 (Stable Release) `;
- Zones are loaded;
- Spare ZSK for jamm.ie is retired;
- Other RSA/SHA-256 keys (for jamm.ie) are accepted and retained;
- A CDS RR is published for jamm.ie, matching the current DS RR;
- ECDSAP256SHA256 keys (for no8.be) are not accepted;
- New ECDSAP256SHA256 keys are created for no8.be;
- No CDS RR is generated for no8.be.

Unless I'm missing something, there seems to be a discrepancy
according to key type between the handling of RSA/SHA-256 and
ECDSAP256SHA256 keys respectively.

/Niall



--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to introduce automatic signing for existing signed zones?

2022-11-07 Thread Matthijs Mekking

Hi Niall,

You need to share the dnssec-policy for no8.be in order to investigate 
why it doesn't show the expected behavior, but I suspect that the policy 
did not match the properties for the existing DNSSEC keys completely.


Best regards,

Matthijs

On 07-11-2022 12:40, Niall O'Reilly wrote:

I have a couple of zones which I want to migrate from CLI-driven
signing to BIND9 automatic signing, while avoiding any change to
the respective parent-zone DS RR.

Status quo ante:

- https://dnsviz.net/d/no8.be/dnssec/
   separate KSK, ZSK; both using alg 13
- https://dnsviz.net/d/jamm.ie/dnssec/
   2048-bit KSK, 2x 1024-bit ZSKs (live and spare); all using alg 8

Preparation:

- Set up minimal stand-alone instance of BIND9 named,
   configured with a **dnssec-policy** for each algorithm,
   matching properties of existing DNSSEC keys, and with
   `lifetime unlimited`;
- Deliver current key files and recently-signed copy of
   zone files to this instance.

Expected behaviour on starting named:

- Zones are loaded;
- Spare ZSK for jamm.ie is retired;
- Other keys for each zone are accepted and retained;
- A CDS RR is generated for each zone, matching the current DS RR.

Observed behaviour:

- `named -v` shows `BIND 9.18.8 (Stable Release) `;
- Zones are loaded;
- Spare ZSK for jamm.ie is retired;
- Other RSA/SHA-256 keys (for jamm.ie) are accepted and retained;
- A CDS RR is published for jamm.ie, matching the current DS RR;
- ECDSAP256SHA256 keys (for no8.be) are not accepted;
- New ECDSAP256SHA256 keys are created for no8.be;
- No CDS RR is generated for no8.be.

Unless I'm missing something, there seems to be a discrepancy
according to key type between the handling of RSA/SHA-256 and
ECDSAP256SHA256 keys respectively.

/Niall



--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users