Re: Unable to get authenticated negative responses from BIND 9.6.0 w/ NSEC3?

2009-01-13 Thread Johan Ihren

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Mark,

Anyone done this recently who can give me a suggestion to where I  
may

go wrong?


NXDOMAIN + OPTOUT - AD=0


Doh! I reversed the logic for OPTOUT in my apparently confused head.  
Many thanks for the quick correction. Everything works just as expected.


Johan

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFJbG6jKJmr+nqSTbYRAiEjAJkBVg5vfoPLjjKa+O2N5I1fJnyoeACeP0yA
ig4M1FlGnf1bXP51SCP2oYw=
=PFp0
-END PGP SIGNATURE-
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Unable to get authenticated negative responses from BIND 9.6.0 w/ NSEC3?

2009-01-12 Thread Mark Andrews

In message a0e00a9b-89cc-4b94-a3a5-49fd22fe3...@johani.org, Johan Ihren 
writes:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 I realise this just has to be a user error, but sofar I've been  
 completely unsuccessful in getting an authenticated response from a  
 9.6.0 recursive server with trusted keys correctly configured.
 
 I've done this:
 
 * Signed the zones:
 
 parent is signed with NSEC semantics, key algorithm is RSASHA1
 child1.parent is signed with NSEC, key algorithm is RSASHA1
 child2.parent is signed with NSEC3, key algorithm is NSEC3RSASHA1

Did you tell dnssec-signzone to generate NSEC3 chains rather
than NSEC chains.  NSEC3RSASHA1 allows for both NSEC and
NSEC3 chains and dnssec-signzone defaults to NSEC chains.

dnssec-signzone -3 salt [-H iterations] [-A] 

 * Created the secure delegations:
 
 the DS records for child1.parent and child2.parent both use the  
 correct algorithm numbers (5 and 7 respectively)
 
 * Configured a trusted key for parent in a recursive server:
 
 The trusted key is correctly configured, because I'm able to validate  
 positive responses from all three zones (which also proves that the  
 delegations are correctly secured via the DS records). I'm also able  
 to validate negative responses from parent and child1.parent.
 
 And, yes, I have dnssec-enable yes; dnssec-validation yes; in  
 relevant places.
 
 But I fail to validate the interesting case, i.e. a negative response  
 from child2.parent containing NSEC3 records as the proof. I get the  
 response, with all the NSEC3s and their RRSIGs. But no AD bit.
 
 Anyone done this recently who can give me a suggestion to where I may  
 go wrong?
 
 Johan
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.5 (Darwin)
 
 iD8DBQFJZy3KKJmr+nqSTbYRAgR9AKCioFf7n+IZmKfH0qenvlZnnh6FpQCeLl0e
 w3pw5x1lyPwkJnM3iRGjiP4=
 =tnBX
 -END PGP SIGNATURE-
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Unable to get authenticated negative responses from BIND 9.6.0 w/ NSEC3?

2009-01-12 Thread Johan Ihren

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Mark,

On 12 Jan 2009, at 23:49, Mark Andrews wrote:


I realise this just has to be a user error, but sofar I've been
completely unsuccessful in getting an authenticated response from a
9.6.0 recursive server with trusted keys correctly configured.

I've done this:

* Signed the zones:

parent is signed with NSEC semantics, key algorithm is RSASHA1
child1.parent is signed with NSEC, key algorithm is RSASHA1
child2.parent is signed with NSEC3, key algorithm is NSEC3RSASHA1


Did you tell dnssec-signzone to generate NSEC3 chains rather
than NSEC chains.  NSEC3RSASHA1 allows for both NSEC and
NSEC3 chains and dnssec-signzone defaults to NSEC chains.

dnssec-signzone -3 salt [-H iterations] [-A] 


Absolutely, and the signed zone looks fine (except that it is full of  
ugly NSEC3's ;-). This is my dnssec-signzone invocation:


dnssec-signzone -N increment -v 9 -a -A -H 1 -3  -o $ZONE $ZONE $ZSK  
$KSK



* Created the secure delegations:

the DS records for child1.parent and child2.parent both use the
correct algorithm numbers (5 and 7 respectively)

* Configured a trusted key for parent in a recursive server:

The trusted key is correctly configured, because I'm able to validate
positive responses from all three zones (which also proves that the
delegations are correctly secured via the DS records). I'm also able
to validate negative responses from parent and child1.parent.

And, yes, I have dnssec-enable yes; dnssec-validation yes; in
relevant places.

But I fail to validate the interesting case, i.e. a negative response
from child2.parent containing NSEC3 records as the proof. I get the
response, with all the NSEC3s and their RRSIGs. But no AD bit.

Anyone done this recently who can give me a suggestion to where I may
go wrong?


Johan

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFJa9hRKJmr+nqSTbYRAuDKAJ4upG/n5lww2yrST29HDzteQX369QCfUqxt
WcZi55ArpM58re2gtd6reAI=
=+sNo
-END PGP SIGNATURE-
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Unable to get authenticated negative responses from BIND 9.6.0 w/ NSEC3?

2009-01-12 Thread Mark Andrews

In message 088512ac-625e-4a72-aa90-65c73fb8b...@johani.org, Johan Ihren 
writes:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hi Mark,
 
 On 12 Jan 2009, at 23:49, Mark Andrews wrote:
 
  I realise this just has to be a user error, but sofar I've been
  completely unsuccessful in getting an authenticated response from a
  9.6.0 recursive server with trusted keys correctly configured.
 
  I've done this:
 
  * Signed the zones:
 
  parent is signed with NSEC semantics, key algorithm is RSASHA1
  child1.parent is signed with NSEC, key algorithm is RSASHA1
  child2.parent is signed with NSEC3, key algorithm is NSEC3RSASHA1
 
  Did you tell dnssec-signzone to generate NSEC3 chains rather
  than NSEC chains.  NSEC3RSASHA1 allows for both NSEC and
  NSEC3 chains and dnssec-signzone defaults to NSEC chains.
 
  dnssec-signzone -3 salt [-H iterations] [-A] 
 
 Absolutely, and the signed zone looks fine (except that it is full of  
 ugly NSEC3's ;-). This is my dnssec-signzone invocation:
 
 dnssec-signzone -N increment -v 9 -a -A -H 1 -3  -o $ZONE $ZONE $ZSK  
 $KSK
 
  * Created the secure delegations:
 
  the DS records for child1.parent and child2.parent both use the
  correct algorithm numbers (5 and 7 respectively)
 
  * Configured a trusted key for parent in a recursive server:
 
  The trusted key is correctly configured, because I'm able to validate
  positive responses from all three zones (which also proves that the
  delegations are correctly secured via the DS records). I'm also able
  to validate negative responses from parent and child1.parent.
 
  And, yes, I have dnssec-enable yes; dnssec-validation yes; in
  relevant places.
 
  But I fail to validate the interesting case, i.e. a negative response
  from child2.parent containing NSEC3 records as the proof. I get the
  response, with all the NSEC3s and their RRSIGs. But no AD bit.
 
  Anyone done this recently who can give me a suggestion to where I may
  go wrong?

NXDOMAIN + OPTOUT - AD=0
 
 Johan
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.5 (Darwin)
 
 iD8DBQFJa9hRKJmr+nqSTbYRAuDKAJ4upG/n5lww2yrST29HDzteQX369QCfUqxt
 WcZi55ArpM58re2gtd6reAI=
 =+sNo
 -END PGP SIGNATURE-
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Unable to get authenticated negative responses from BIND 9.6.0 w/ NSEC3?

2009-01-11 Thread Johan Ihren

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I realise this just has to be a user error, but sofar I've been  
completely unsuccessful in getting an authenticated response from a  
9.6.0 recursive server with trusted keys correctly configured.


I've done this:

* Signed the zones:

parent is signed with NSEC semantics, key algorithm is RSASHA1
child1.parent is signed with NSEC, key algorithm is RSASHA1
child2.parent is signed with NSEC3, key algorithm is NSEC3RSASHA1

* Created the secure delegations:

the DS records for child1.parent and child2.parent both use the  
correct algorithm numbers (5 and 7 respectively)


* Configured a trusted key for parent in a recursive server:

The trusted key is correctly configured, because I'm able to validate  
positive responses from all three zones (which also proves that the  
delegations are correctly secured via the DS records). I'm also able  
to validate negative responses from parent and child1.parent.


And, yes, I have dnssec-enable yes; dnssec-validation yes; in  
relevant places.


But I fail to validate the interesting case, i.e. a negative response  
from child2.parent containing NSEC3 records as the proof. I get the  
response, with all the NSEC3s and their RRSIGs. But no AD bit.


Anyone done this recently who can give me a suggestion to where I may  
go wrong?


Johan

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFJZy3KKJmr+nqSTbYRAgR9AKCioFf7n+IZmKfH0qenvlZnnh6FpQCeLl0e
w3pw5x1lyPwkJnM3iRGjiP4=
=tnBX
-END PGP SIGNATURE-
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users