Re: [KASP] setup KASP in master / slave architecture

2022-12-09 Thread adrien sipasseuth
Hi Matthijs,

thank you, so just to confirm something like this should work :
Master :
dnssec-policy "test" {
keys {
ksk lifetime P3D algorithm rsasha256 2048;
zsk lifetime P2D algorithm rsasha256 1024;
};
};

zone "**" {
type master;
file "/***/*.db";
notify yes;
key-directory "/**/**/";
inline-signing yes;
dnssec-policy test;
};

And my Slaves :
zone  "**" {
type slave;
masters {  ** ; };
file "/ **/ ** / ** .db";
key-directory "/ ** / ** / ** .fr";
auto-dnssec maintain;
inline-signing yes;
};

am i rigth ?

Regards

Adrien




Le ven. 9 déc. 2022 à 09:33, Matthijs Mekking  a écrit :

> Hi Adrien,
>
> You should **not** copy the dnssec-policy configuration to your
> secondaries. They transfer in the signed zone from the primary server.
>
> Best regards,
>
> Matthijs
>
>
> On 12/9/22 09:24, adrien sipasseuth wrote:
> > Hello,
> >
> >
> > Lokking for some guidance, sorry if i use the wrong way to contact
> > community user support.
> >
> >
> > I would like to set up DNSSEC using KASP.
> >
> > I have an architecture with a master and several slaves.
> >
> > Here is my policy and zone configuration:
> >
> > dnssec-policy "test" {
> >
> >  keys {
> >
> >  ksk lifetime P3D algorithm rsasha256 2048;
> >
> >  zsk lifetime P2D algorithm rsasha256 1024;
> >
> >  };
> >
> > };
> >
> > zone "**" {
> >
> >  type master;
> >
> >  file "/***/*.db";
> >
> >  notify yes;
> >
> >  key-directory "/**/**/";
> >
> >  inline-signing yes;
> >
> >  dnssec-policy test;
> >
> > };
> >
> >
> > after restart, it seems ok, keys are generated on master, no errors in
> > logs etc.
> >
> > I copied this policy, the keys and the zone configuration on each of my
> > slaves then I restarted my slaves everything seems ok (in the logs).
> >
> > except that now I wonder if the keys on each of my slaves will be
> > generated independently from those of my master.
> >
> >
> > In this case, I will end up with different keys for the same zone
> > depending on the slave1 / slave2 etc / master. I suppose that it is not
> > good because we should have for the same zone, a pair of keys and this
> > one should be copied on each slaves?
> >
> > There some tuto / documentation about how to setup KASP in master /
> > slaves topology ?
> >
> >
> > Sorry if it's not enough clear...
> >
> >
> > Thank you
> >
> > *Adrien SIPASSEUTH*
> >
> >
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [KASP] setup KASP in master / slave architecture

2022-12-12 Thread adrien sipasseuth
Hi,

It seems to work! Thank you!

To summarize:
On the master side I have the following configuration:

dnssec-policy "test" {

keys {

ksk lifetime P3D algorithm rsasha256 2048;

zsk lifetime P2D algorithm rsasha256 1024;

};

};



zone "**" {

type master;

file "/***/*.db";

notify yes;

key-directory "/**/**/";

inline-signing yes;

dnssec-policy test;

};


on the slaves side I have the following configuration:
zone  "**" {
type slave;
masters {  ** ; };
file "/ **/ ** / ** .db";
};


the keys are generated on the master but not on the slaves.
so I don't understand how the slaves can read their zone file which ends in
".signed" because they don't have the keys ? (but it's work with dig, i see
DS with the right ZSK)

Regards

Adrien





Le ven. 9 déc. 2022 à 10:02, Matthijs Mekking  a écrit :

> Hi,
>
> No.
>
> You don't need DNSSEC maintenance on your secondary zones if you already
> have set it on your primary zones. So
>
> zone "***" {
>type secondary;
>primaries { ***; };
>    file "***.db";
> };
>
> is enough.
>
> Best regards,
>
> Matthijs.
>
> On 12/9/22 09:58, adrien sipasseuth wrote:
> > Hi Matthijs,
> >
> > thank you, so just to confirm something like this should work :
> > Master :
> > dnssec-policy "test" {
> >  keys {
> >  ksk lifetime P3D algorithm rsasha256 2048;
> >  zsk lifetime P2D algorithm rsasha256 1024;
> >  };
> > };
> >
> > zone "**" {
> >  type master;
> >  file "/***/*.db";
> >  notify yes;
> >  key-directory "/**/**/";
> >  inline-signing yes;
> >  dnssec-policy test;
> > };
> >
> > And my Slaves :
> > zone "**" {
> >  type slave;
> >  masters { ** ; };
> >  file "/ **/ ** / ** .db";
> >  key-directory "/ ** / ** / **
> .fr";
> >  auto-dnssec maintain;
> >  inline-signing yes;
> > };
> >
> > am i rigth ?
> >
> > Regards
> >
> > Adrien
> >
> >
> >
> >
> > Le ven. 9 déc. 2022 à 09:33, Matthijs Mekking  > <mailto:matth...@isc.org>> a écrit :
> >
> > Hi Adrien,
> >
> > You should **not** copy the dnssec-policy configuration to your
> > secondaries. They transfer in the signed zone from the primary
> server.
> >
> > Best regards,
> >
> > Matthijs
> >
> >
> > On 12/9/22 09:24, adrien sipasseuth wrote:
> >  > Hello,
> >  >
> >  >
> >  > Lokking for some guidance, sorry if i use the wrong way to contact
> >  > community user support.
> >  >
> >  >
> >  > I would like to set up DNSSEC using KASP.
> >  >
> >  > I have an architecture with a master and several slaves.
> >  >
> >  > Here is my policy and zone configuration:
> >  >
> >  > dnssec-policy "test" {
> >  >
> >  >  keys {
> >  >
> >  >  ksk lifetime P3D algorithm rsasha256 2048;
> >  >
> >  >  zsk lifetime P2D algorithm rsasha256 1024;
> >  >
> >  >  };
> >  >
> >  > };
> >  >
> >  > zone "**" {
> >  >
> >  >  type master;
> >  >
> >  >  file "/***/*.db";
> >  >
> >  >  notify yes;
> >  >
> >  >  key-directory "/**/**/";
> >  >
> >  >  inline-signing yes;
> >  >
> >  >  dnssec-policy test;
> >  >
> >  > };
> >  >
> >  >
> >  > after restart, it seems ok, keys are generated on master, no
> > errors in
> >  > logs etc.
> >  >
> >  > I copied this policy, the keys and the zone configuration on each
> > of my
> >  > slaves then I restarted my slaves everything seems ok (in the
> logs).
> >  >
> >  > except that now I wonder if t

Re: [KASP] setup KASP in master / slave architecture

2022-12-16 Thread adrien sipasseuth
Hi,

I deleted my zone file .db on my slaves and I forced a transfer from
the master.

Now it seems to work, I do have the RRSIG associated with my RRset A when I
do a dig from my slave.

When I test my dig from my internal network I actually don't have the ad
flag. But from the google resolver (https://dns.google/) I have the flag.

To summarize:
- on my master : declaration of my policy and I use it in my zone
configuration
- on the slaves : configuration of my zone, standard without mentioning
dnssec-policy

What I observe:
- on the master: files .db, .db.jbk,
.db.signed,.db.signed.jnl and my keys
- on the slaves: files .db

I don't understand why there is no .db.signed file on my slave
knowing that a dig from a slave does return RRSIG.

zone  "**" {
type slave;
masters {  ** ; };
file "/ **/ ** / ** .db";
};

Should I specify the .db or the .db.signed ? On the master
or/and ths slaves ?

Regards,

Adrien

Le jeu. 15 déc. 2022 à 19:10, Darren Ankney  a
écrit :

> I have a simple “mylocal” zone setup with a primary and secondary server.
>
> my primary has this .jnl file:
>
> mylocal.jnl
>
>
> My secondary has this similar .jnl file:
>
>
> mylocal.saved.jnl
>
>
> which I believe was distributed via zone transfer.  You find no such
> similar files on your secondary?
>
>
> If you
>
>
> dig @ .. A +dnssec +multiline
>
>
> where  is the IP of your recursive server and
> .. is something in the domain you are trying to
> verify the DNSSEC is working.
>
>
> Does your flags line look something like this?
>
>
> ;; flags: qr rd ra ad;
>
>
> Per the manual:
>
>
> The important detail in this output is the presence of the ad flag in the
> header. This signifies that BIND has retrieved all related DNSSEC
> information related to the target of the query (ftp.isc.org) and that the
> answer received has passed the validation process described in How Are
> Answers Verified?. We can have confidence in the authenticity and integrity
> of the answer, that ftp.isc.org really points to the IP address
> 149.20.1.49, and that it was not a spoofed answer from a clever attacker.
>
>
>
>
> https://bind9.readthedocs.io/en/v9_18_9/dnssec-guide.html#using-dig-to-verify
>
> My “flags” line does not show the “ad” flag as this is just a set of
> private servers on a local lan. I can’t submit the DNSSEC details upstream
> as described here:
>
>
> https://bind9.readthedocs.io/en/v9_18_9/dnssec-guide.html#uploading-information-to-the-parent-zone
>
>
> On Dec 15, 2022, at 12:05 PM, adrien sipasseuth <
> sipasseuth.adr...@gmail.com> wrote:
>
> Hi,
>
> Ok, I got confused, no need for the keys on the slavs actually.
>
> On the other hand, my slaves should generate the .signed, .signed.jnl and
> .jbk files of my zones, no? currently it is not my case, should I copy them
> from the master?
>
> moreover, when I test a "dig A" I don't have the associated RRSIG when I
> do my "dig A" on a slave while on the master I do.
>
> Regards,
> Adrien
>
>
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [KASP] setup KASP in master / slave architecture

2022-12-15 Thread adrien sipasseuth
Hi,

Ok, I got confused, no need for the keys on the slavs actually.

On the other hand, my slaves should generate the .signed, .signed.jnl and
.jbk files of my zones, no? currently it is not my case, should I copy them
from the master?

moreover, when I test a "dig A" I don't have the associated RRSIG when I do
my "dig A" on a slave while on the master I do.

Regards,
Adrien

Le lun. 12 déc. 2022 à 12:59, Darren Ankney  a
écrit :

>
>
> the keys are generated on the master but not on the slaves.
> so I don't understand how the slaves can read their zone file which ends
> in ".signed" because they don't have the keys ? (but it's work with dig, i
> see DS with the right ZSK)
>
> Regards
>
> Adrien
>
>
> Because the zone is signed with DNSSEC but not encrypted.  DNSSEC is only
> providing authentication of the source of the zone, not hiding the contents
> (https://www.rfc-editor.org/rfc/rfc4033).  For the primary -> secondary
> zone transfer, you should setup TSIG authentication if you haven’t already
> to ensure that only your secondary can perform a zone transfer (
> https://www.rfc-editor.org/rfc/rfc2931 and
> https://bind9.readthedocs.io/en/v9_18_9/chapter7.html#tsig).
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


[KASP] setup KASP in master / slave architecture

2022-12-09 Thread adrien sipasseuth
Hello,


Lokking for some guidance, sorry if i use the wrong way to contact community
user support.


I would like to set up DNSSEC using KASP.

I have an architecture with a master and several slaves.

Here is my policy and zone configuration:

dnssec-policy "test" {

keys {

ksk lifetime P3D algorithm rsasha256 2048;

zsk lifetime P2D algorithm rsasha256 1024;

};

};



zone "**" {

type master;

file "/***/*.db";

notify yes;

key-directory "/**/**/";

inline-signing yes;

dnssec-policy test;

};


after restart, it seems ok, keys are generated on master, no errors in logs
etc.

I copied this policy, the keys and the zone configuration on each of my
slaves then I restarted my slaves everything seems ok (in the logs).

except that now I wonder if the keys on each of my slaves will be generated
independently from those of my master.


In this case, I will end up with different keys for the same zone depending
on the slave1 / slave2 etc / master. I suppose that it is not good because
we should have for the same zone, a pair of keys and this one should be
copied on each slaves?

There some tuto / documentation about how to setup KASP in master / slaves
topology ?


Sorry if it's not enough clear...


Thank you



*Adrien SIPASSEUTH*
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


[KASP] Key rollover

2023-01-17 Thread adrien sipasseuth
Hello,

I put the management of DNSSEC with KASP, the zone is well functional. (dig
with "AD" flag etc)

On the other hand, I can't see when the key rollover period for my KSK is
over (2 KSKs with a dig DNSKEY...)

Without KASP, it was easy because I generated the second KSK key but with
KASP, it is managed automatically.

So, I have to adapt my scripts to check that there is :
 - a used KSK key and a next KSK key
 - Or only one KSK key used (if we are not in rollover phase)

Except that with my current policy, I never see 2 KSKs via a "dig
DNSKEY...".
here is my policy :

dnssec-policy "test" {
keys {
ksk lifetime P7D algorithm ecdsa256;
zsk lifetime P3D algorithm ecdsa256;
};
purge-keys 1d;
publish-safety 3d;
retire-safety 3d;
};

I see either my KSK in use or my next KSK (via "dig DNSKEY...") but never
both at the same time.

Is this a normal behavior or am I doing it wrong?

Regards, Adrien
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [KASP] Key rollover

2023-01-24 Thread adrien sipasseuth
Hello Matthijs,

Indeed I had not published the DS at my registar because I thought that the
second KSK would have appeared anyway at the time of the rollover.

I published the DS yesterday and I reported to BIND with the command you
gave me. I didn't find any error in the logs so everything must have been
fine!

here is the state file of the KSK in use :
; This is the state of key 46358, for ***.
Algorithm: 13
Length: 256
Lifetime: 604800
Predecessor: 28887
KSK: yes
ZSK: no
Generated: 20230117165503 (Tue Jan 17 17:55:03 2023)
Published: 20230117165503 (Tue Jan 17 17:55:03 2023)
Active: 20230120180003 (Fri Jan 20 19:00:03 2023)
Retired: 20230127180003 (Fri Jan 27 19:00:03 2023)
Removed: 20230131190003 (Tue Jan 31 20:00:03 2023)
DSPublish: 20230123081513 (Mon Jan 23 09:15:13 2023)
PublishCDS: 20230120180003 (Fri Jan 20 19:00:03 2023)
DNSKEYChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
KRRSIGChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
DSChange: 20230117165503 (Tue Jan 17 17:55:03 2023)
DNSKEYState: omnipresent
KRRSIGState: omnipresent
DSState: hidden
GoalState: omnipresent

>From my understanding, the second KSK should appear because I put the
parameter "publish-safety 3d;" that is to say 3 days before the expiration
("retired") of the key in use. is that right?

that is to say tonight at 7pm, I will see tomorrow if this one appears.

regards, Adrien



Le jeu. 19 janv. 2023 à 09:13, Matthijs Mekking  a écrit :

> Hi Adrien,
>
> Without any logs or key **state** files, I can't really tell what is
> going on.
>
> My only gut feeling is that you have never signaled BIND 9 that the DS
> has been published. You can run 'rndc dnssec -checkds -key 12345
> published example.com' or set up parental-agents to do it for you.
>
> Best regards,
>
> Matthijs
>
> On 1/17/23 09:38, adrien sipasseuth wrote:
> > Hello,
> >
> > I put the management of DNSSEC with KASP, the zone is well functional.
> > (dig with "AD" flag etc)
> >
> > On the other hand, I can't see when the key rollover period for my KSK
> > is over (2 KSKs with a dig DNSKEY...)
> >
> > Without KASP, it was easy because I generated the second KSK key but
> > with KASP, it is managed automatically.
> >
> > So, I have to adapt my scripts to check that there is :
> >   - a used KSK key and a next KSK key
> >   - Or only one KSK key used (if we are not in rollover phase)
> >
> > Except that with my current policy, I never see 2 KSKs via a "dig
> > DNSKEY...".
> > here is my policy :
> >
> > dnssec-policy "test" {
> >  keys {
> >  ksk lifetime P7D algorithm ecdsa256;
> >  zsk lifetime P3D algorithm ecdsa256;
> >  };
> >  purge-keys 1d;
> >  publish-safety 3d;
> >  retire-safety 3d;
> > };
> >
> > I see either my KSK in use or my next KSK (via "dig DNSKEY...") but
> > never both at the same time.
> >
> > Is this a normal behavior or am I doing it wrong?
> >
> > Regards, Adrien
> >
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [KASP] Key rollover

2023-01-24 Thread adrien sipasseuth
Hello,

I don't why  DSState: hidden, it's ok with some online check tools like :
- https://dnssec-analyzer.verisignlabs.com/
- https://zonemaster.net/fr/run-test

my master is hidden, it can be related ? How i can debug this DSState:
hidden ?

I found this command to check actual status : rndc dnssec -status **
This is the output :

key: 46358 (ECDSAP256SHA256), KSK
  published:  yes - since Tue Jan 17 17:55:03 2023
  key signing:yes - since Tue Jan 17 17:55:03 2023

  Next rollover scheduled on Tue Jan 24 17:55:03 2023
  - goal:   omnipresent
  - dnskey: omnipresent
  - ds: hidden
  - key rrsig:  omnipresent
...

Regards Adrien

Le mar. 24 janv. 2023 à 09:27, Matthijs Mekking  a écrit :

> Hi Adrien,
>
> I don't think it is fine yet. I see in your state file the following line:
>
>  > DSState: hidden
>
> This means the DS is not published according to BIND.
>
>  > From my understanding, the second KSK should appear because I put the
>  > parameter "publish-safety 3d;" that is to say 3 days before the
>  > expiration ("retired") of the key in use. is that right?
>
> In addition to the DNSKEY TTL yes. The successor KSK should be
> pre-published the sum of dnskey-ttl, publish-safety, and
> zone-propagation-delay, prior to its retirement.
>
> Best regards,
>
> Matthijs
>
> On 1/24/23 09:08, adrien sipasseuth wrote:
> > Hello Matthijs,
> >
> > Indeed I had not published the DS at my registar because I thought that
> > the second KSK would have appeared anyway at the time of the rollover.
> >
> > I published the DS yesterday and I reported to BIND with the command you
> > gave me. I didn't find any error in the logs so everything must have
> > been fine!
> >
> > here is the state file of the KSK in use :
> > ; This is the state of key 46358, for ***.
> > Algorithm: 13
> > Length: 256
> > Lifetime: 604800
> > Predecessor: 28887
> > KSK: yes
> > ZSK: no
> > Generated: 20230117165503 (Tue Jan 17 17:55:03 2023)
> > Published: 20230117165503 (Tue Jan 17 17:55:03 2023)
> > Active: 20230120180003 (Fri Jan 20 19:00:03 2023)
> > Retired: 20230127180003 (Fri Jan 27 19:00:03 2023)
> > Removed: 20230131190003 (Tue Jan 31 20:00:03 2023)
> > DSPublish: 20230123081513 (Mon Jan 23 09:15:13 2023)
> > PublishCDS: 20230120180003 (Fri Jan 20 19:00:03 2023)
> > DNSKEYChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
> > KRRSIGChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
> > DSChange: 20230117165503 (Tue Jan 17 17:55:03 2023)
> > DNSKEYState: omnipresent
> > KRRSIGState: omnipresent
> > DSState: hidden
> > GoalState: omnipresent
> >
> >  From my understanding, the second KSK should appear because I put the
> > parameter "publish-safety 3d;" that is to say 3 days before the
> > expiration ("retired") of the key in use. is that right?
> >
> > that is to say tonight at 7pm, I will see tomorrow if this one appears.
> >
> > regards, Adrien
> >
> >
> >
> > Le jeu. 19 janv. 2023 à 09:13, Matthijs Mekking  > <mailto:matth...@isc.org>> a écrit :
> >
> > Hi Adrien,
> >
> > Without any logs or key **state** files, I can't really tell what is
> > going on.
> >
> > My only gut feeling is that you have never signaled BIND 9 that the
> DS
> > has been published. You can run 'rndc dnssec -checkds -key 12345
> > published example.com <http://example.com>' or set up
> > parental-agents to do it for you.
> >
> > Best regards,
> >
> > Matthijs
> >
> > On 1/17/23 09:38, adrien sipasseuth wrote:
> >  > Hello,
> >  >
> >  > I put the management of DNSSEC with KASP, the zone is well
> > functional.
> >  > (dig with "AD" flag etc)
> >  >
> >  > On the other hand, I can't see when the key rollover period for
> > my KSK
> >  > is over (2 KSKs with a dig DNSKEY...)
> >  >
> >  > Without KASP, it was easy because I generated the second KSK key
> but
> >  > with KASP, it is managed automatically.
> >  >
> >  > So, I have to adapt my scripts to check that there is :
> >  >   - a used KSK key and a next KSK key
> >  >   - Or only one KSK key used (if we are not in rollover phase)
> >  >
> >  > Except that with my current policy, I never see 2 KSKs via a "dig
> >  > DNSKEY...".
> >  > here i

Re: [KASP] Key rollover

2023-01-25 Thread adrien sipasseuth
24 17:55:03 2023)
DSChange: 20230124165503 (Tue Jan 24 17:55:03 2023)
DNSKEYState: rumoured
KRRSIGState: rumoured
DSState: hidden
GoalState: omnipresent

Regards Adrien


Le mar. 24 janv. 2023 à 15:18, adrien sipasseuth <
sipasseuth.adr...@gmail.com> a écrit :

> Hello,
>
> I don't why  DSState: hidden, it's ok with some online check tools like :
> - https://dnssec-analyzer.verisignlabs.com/
> - https://zonemaster.net/fr/run-test
>
> my master is hidden, it can be related ? How i can debug this DSState:
> hidden ?
>
> I found this command to check actual status : rndc dnssec -status
> **
> This is the output :
> 
> key: 46358 (ECDSAP256SHA256), KSK
>   published:  yes - since Tue Jan 17 17:55:03 2023
>   key signing:yes - since Tue Jan 17 17:55:03 2023
>
>   Next rollover scheduled on Tue Jan 24 17:55:03 2023
>   - goal:   omnipresent
>   - dnskey: omnipresent
>   - ds: hidden
>   - key rrsig:  omnipresent
> ...
>
> Regards Adrien
>
> Le mar. 24 janv. 2023 à 09:27, Matthijs Mekking  a
> écrit :
>
>> Hi Adrien,
>>
>> I don't think it is fine yet. I see in your state file the following line:
>>
>>  > DSState: hidden
>>
>> This means the DS is not published according to BIND.
>>
>>  > From my understanding, the second KSK should appear because I put the
>>  > parameter "publish-safety 3d;" that is to say 3 days before the
>>  > expiration ("retired") of the key in use. is that right?
>>
>> In addition to the DNSKEY TTL yes. The successor KSK should be
>> pre-published the sum of dnskey-ttl, publish-safety, and
>> zone-propagation-delay, prior to its retirement.
>>
>> Best regards,
>>
>> Matthijs
>>
>> On 1/24/23 09:08, adrien sipasseuth wrote:
>> > Hello Matthijs,
>> >
>> > Indeed I had not published the DS at my registar because I thought that
>> > the second KSK would have appeared anyway at the time of the rollover.
>> >
>> > I published the DS yesterday and I reported to BIND with the command
>> you
>> > gave me. I didn't find any error in the logs so everything must have
>> > been fine!
>> >
>> > here is the state file of the KSK in use :
>> > ; This is the state of key 46358, for ***.
>> > Algorithm: 13
>> > Length: 256
>> > Lifetime: 604800
>> > Predecessor: 28887
>> > KSK: yes
>> > ZSK: no
>> > Generated: 20230117165503 (Tue Jan 17 17:55:03 2023)
>> > Published: 20230117165503 (Tue Jan 17 17:55:03 2023)
>> > Active: 20230120180003 (Fri Jan 20 19:00:03 2023)
>> > Retired: 20230127180003 (Fri Jan 27 19:00:03 2023)
>> > Removed: 20230131190003 (Tue Jan 31 20:00:03 2023)
>> > DSPublish: 20230123081513 (Mon Jan 23 09:15:13 2023)
>> > PublishCDS: 20230120180003 (Fri Jan 20 19:00:03 2023)
>> > DNSKEYChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
>> > KRRSIGChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
>> > DSChange: 20230117165503 (Tue Jan 17 17:55:03 2023)
>> > DNSKEYState: omnipresent
>> > KRRSIGState: omnipresent
>> > DSState: hidden
>> > GoalState: omnipresent
>> >
>> >  From my understanding, the second KSK should appear because I put the
>> > parameter "publish-safety 3d;" that is to say 3 days before the
>> > expiration ("retired") of the key in use. is that right?
>> >
>> > that is to say tonight at 7pm, I will see tomorrow if this one appears.
>> >
>> > regards, Adrien
>> >
>> >
>> >
>> > Le jeu. 19 janv. 2023 à 09:13, Matthijs Mekking > > <mailto:matth...@isc.org>> a écrit :
>> >
>> > Hi Adrien,
>> >
>> > Without any logs or key **state** files, I can't really tell what is
>> > going on.
>> >
>> > My only gut feeling is that you have never signaled BIND 9 that the
>> DS
>> > has been published. You can run 'rndc dnssec -checkds -key 12345
>> > published example.com <http://example.com>' or set up
>> > parental-agents to do it for you.
>> >
>> > Best regards,
>> >
>> > Matthijs
>> >
>> > On 1/17/23 09:38, adrien sipasseuth wrote:
>> >  > Hello,
>> >  >
>> >  > I put the management of DNSSEC with KASP, the zone is well
>> > functional.
>> >  > (dig with "AD" flag etc)

Re: [KASP] Key rollover

2023-02-08 Thread adrien sipasseuth
Hello,

I waited 24 hours and then put my zone back in dnssec.

after 24 everything seems ok... at least by doing a "rndc dnssec -status
"

everything is in omnipresent:
  Next rollover scheduled on Fri Feb 10 09:15:51 2023
  - goal: omnipresent
  - dnskey: omnipresent
  - ds: omnipresent
  - key rrsig: omnipresent

so it works BUT I need to know more than 48h in advance that the rollover
is starting to submit the new KSK to my registar.

How can I set this up if it's not with "public-safety"?

Regards,
Adrien



Le mer. 25 janv. 2023 à 11:34, Matthijs Mekking  a écrit :

>
>
> On 1/24/23 15:18, adrien sipasseuth wrote:
> > Hello,
> >
> > I don't why DSState: hidden, it's ok with some online check tools like :
> > - https://dnssec-analyzer.verisignlabs.com/
> > <https://dnssec-analyzer.verisignlabs.com/>
> > - https://zonemaster.net/fr/run-test <https://zonemaster.net/fr/run-test
> >
>
> DSState: hidden is what BIND thinks. Note that it does not query yet to
> determine the DSState.
>
>
> >
> > my master is hidden, it can be related ? How i can debug this DSState:
> > hidden ?
>
> It has nothing to do with hidden primaries.
>
>
> > I found this command to check actual status : rndc dnssec -status
> **
> > This is the output :
> > 
> > key: 46358 (ECDSAP256SHA256), KSK
> >published:  yes - since Tue Jan 17 17:55:03 2023
> >key signing:yes - since Tue Jan 17 17:55:03 2023
> >
> >Next rollover scheduled on Tue Jan 24 17:55:03 2023
> >- goal:   omnipresent
> >- dnskey: omnipresent
> >- ds: hidden
> >- key rrsig:  omnipresent
>
> It is hard to determine why your DS is hidden. If all other elements are
> omnipresent, the DS should be rumoured (because you may submit it to the
> parent).
>
> I have a feeling this is because your publish-safety is 3 days. It takes
> an additional 3 days before continuing with the rollover, thus also with
> "making the DS known to the world". In other words, I think BIND does
> not yet think it is safe to publish the DS, hence DS is hidden.
>
> I understand this may not reflect the real world, and perhaps it is a
> bug. If someone issues a "rndc dnssec -checkds published" command", we
> probably should force move the DS state from "hidden" to "rumoured".
>
> Best regards,
>
> Matthijs
>
>
>
>
> > ...
> >
> > Regards Adrien
> >
> > Le mar. 24 janv. 2023 à 09:27, Matthijs Mekking  > <mailto:matth...@isc.org>> a écrit :
> >
> > Hi Adrien,
> >
> > I don't think it is fine yet. I see in your state file the following
> > line:
> >
> >   > DSState: hidden
> >
> > This means the DS is not published according to BIND.
> >
> >   > From my understanding, the second KSK should appear because I
> > put the
> >   > parameter "publish-safety 3d;" that is to say 3 days before the
> >   > expiration ("retired") of the key in use. is that right?
> >
> > In addition to the DNSKEY TTL yes. The successor KSK should be
> > pre-published the sum of dnskey-ttl, publish-safety, and
> > zone-propagation-delay, prior to its retirement.
> >
> > Best regards,
> >
> > Matthijs
> >
> > On 1/24/23 09:08, adrien sipasseuth wrote:
> >  > Hello Matthijs,
> >  >
> >  > Indeed I had not published the DS at my registar because I
> > thought that
> >  > the second KSK would have appeared anyway at the time of the
> > rollover.
> >  >
> >  > I published the DS yesterday and I reported to BIND with the
> > command you
> >  > gave me. I didn't find any error in the logs so everything must
> have
> >  > been fine!
> >  >
> >  > here is the state file of the KSK in use :
> >  > ; This is the state of key 46358, for ***.
> >  > Algorithm: 13
> >  > Length: 256
> >  > Lifetime: 604800
> >  > Predecessor: 28887
> >  > KSK: yes
> >  > ZSK: no
> >  > Generated: 20230117165503 (Tue Jan 17 17:55:03 2023)
> >  > Published: 20230117165503 (Tue Jan 17 17:55:03 2023)
> >  > Active: 20230120180003 (Fri Jan 20 19:00:03 2023)
> >  > Retired: 20230127180003 (Fri Jan 27 19:00:03 2023)
> >  > Removed: 20230131190003 (Tue Jan 31 20:00:03 2023)
&g

Re: [KASP] Key rollover

2023-02-13 Thread adrien sipasseuth
Hi,

"You configure parental agents and named will check which DS’s are
published.  Named won’t complete the
roll until it knows the new DS is published."
=> what is parental agent ? i don't find this term in Bind documentation.
>From what I understand, you have to specify to Bind that the new DS is
published with the command: rndc dnssec -checkds -key 
published 

"If it was me, I'd set the KSK to not roll-over automatically, and
instead create a recurring reminder for yourself to initiate the KSK
roll-over manually? That way you'd never get caught out with a KSK
roll-over happening when you weren't prepared for it? "
=> I don't know if I can get a policy for ZSK and a manual method for KSK.
>From what I understand if I want to use a policy I have to remove
"auto-dnssec maintain;" which is necessary for the manual method right?

In the meantime, I wonder if I can't stay on the manual method even with a
bind 9.18? I read that the auto-dnssec directive might disappear in favor
of dnssec-policy. Does that mean that it might not be possible to do it
manually anymore? source here =>
https://kb.isc.org/v1/docs/dnssec-key-and-signing-policy

Regards,
Adrien

Le jeu. 9 févr. 2023 à 10:35, Mark Andrews  a écrit :

> You configure parental agents and named will check which DS’s are
> published.  Named won’t complete the
> roll until it knows the new DS is published.
>
> > On 9 Feb 2023, at 19:49, Nick Tait via bind-users <
> bind-users@lists.isc.org> wrote:
> >
> > On 9/02/23 05:17, adrien sipasseuth wrote:
> >> so it works BUT I need to know more than 48h in advance that the
> rollover is starting to submit the new KSK to my registar.
> >>
> >> How can I set this up if it's not with "public-safety"?
> > If it was me, I'd set the KSK to not roll-over automatically, and
> instead create a recurring reminder for yourself to initiate the KSK
> roll-over manually? That way you'd never get caught out with a KSK
> roll-over happening when you weren't prepared for it?
> > --
> > Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
> >
> > ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
> >
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
>
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org
>
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


[DNSSEC] testing KASP

2024-05-16 Thread adrien sipasseuth
Hello,

I try to set up a testing environment in order to create some scripts for
automated the roll over KSK.

# question 1 #
this is my policy :

dnssec-policy "test" {
keys {
ksk lifetime P3D algorithm ecdsa256 2048;
zsk lifetime P1D algorithm ecdsa256 2048;
};

// Key timings
purge-keys P4D;

// Signature timings
signatures-refresh  PT50M;
signatures-validity PT1H;
signatures-validity-dnskey PT1H;

// Zone parameters
max-zone-ttl PT1H;
parent-ds-ttl PT1H;

};

I would like automaticly update new DS to my registar, to do it this my
logic :
For each file en .state
If is KSK with "DSState: rumoured" or "DSState: hidden"
If not in my registar (dig ds  +dnssec +multiline)
Publish on my Registar(api register)
Notify Bind(bind rndc dnssec -checkds -key  published
)

Do y need to withdraw the old key too immediatly ? anything else to do ?

# question 2 #
If i want to unsigned a zone, i change my policy to "insecure" which is
default but file like .signed still exist, Bind doesn't remove it ?

# question 3 #

In state file, when the remove date issue, can i just remove the key,
anything else to do ?

Regards,
Adrien SIPASSEUTH
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: [DNSSEC] testing KASP

2024-05-29 Thread adrien sipasseuth
Only if KSK has DSState: rumoured. If the DSState is hidden it means
that it is not expected to be in the parent (for example because the
DNSKEY has not yet been fully propagated).


> Do you need to withdraw the old key too immediatly ? anything else to do ?

>>> Do you mean withdraw the old DS?

Yes, the old DS should be not yet withdraw because some RRSIG could be
still valid ? or can i withdraw the old DS / KSK immediatly ?

In my logic :
For each file en .state
If is KSK with "DSState: rumoured" or "DSState: hidden"
If not in my registar (dig ds  +dnssec +multiline)
Publish on my Registar(api register)
Notify Bind(bind rndc dnssec -checkds -key 
published )
Notify Bind(bind rndc dnssec -checkds -key 
withdraw )

In my understanding, i shouldn't do "Notify Bind(bind rndc dnssec -checkds
-key  withdraw )" and wait until all RRSIG sign (with
the old KSK) expire. In that case, how can i check this ? (some dig command
? or check state file for "DSState: unretentive" ?)

regards,

Adrien


Le ven. 17 mai 2024 à 15:13, Matthijs Mekking  a écrit :

> Hi,
>
> On 5/16/24 14:02, adrien sipasseuth wrote:
> > Hello,
> >
> > I try to set up a testing environment in order to create some scripts
> > for automated the roll over KSK.
> >
> > # question 1 #
> > this is my policy :
> >
> > dnssec-policy "test" {
> >  keys {
> >  ksk lifetime P3D algorithm ecdsa256 2048;
> >  zsk lifetime P1D algorithm ecdsa256 2048;
> >  };
> >
> >  // Key timings
> >  purge-keys P4D;
> >
> >  // Signature timings
> >  signatures-refresh  PT50M;
> >  signatures-validity PT1H;
> >  signatures-validity-dnskey PT1H;
> >
> >  // Zone parameters
> >  max-zone-ttl PT1H;
> >  parent-ds-ttl PT1H;
> >
> > };
> >
> > I would like automaticly update new DS to my registar, to do it this my
> > logic :
> >
> > For each file en .state
> >  If is KSK with "DSState: rumoured" or "DSState: hidden"
> >  If not in my registar (dig ds  +dnssec +multiline)
> >  Publish on my Registar(api register)
> >  Notify Bind(bind rndc dnssec -checkds -key  published
> > )
>
> Only if KSK has DSState: rumoured. If the DSState is hidden it means
> that it is not expected to be in the parent (for example because the
> DNSKEY has not yet been fully propagated).
>
>
> > Do y need to withdraw the old key too immediatly ? anything else to do ?
>
> Do you mean withdraw the old DS?
>
> I would use similar logic but then use "unretentive" instead of
> "rumoured". Following the example above:
>
> For each file en .state
>If is KSK with "DSState: unretentive"
>If in my registar (dig ds  +dnssec +multiline)
>Withdraw on my Registar(api register)
>Notify Bind(bind rndc dnssec -checkds -key  withdrawn
>
>
> > # question 2 #
> > If i want to unsigned a zone, i change my policy to "insecure" which is
> > default but file like .signed still exist, Bind doesn't remove
> it ?
>
> Correct. If all DNSSEC records have been removed, it is safe to remove
> the "dnssec-policy" configuration from your named.conf and then remove
> the .signed file.
>
> Unsigning your zone also takes time.
>
>
> > # question 3 #
> >
> > In state file, when the remove date issue, can i just remove the key,
> > anything else to do ?
>
> When all states are "hidden" it is safe to remove the key.
>
> Best regards,
>
> Matthijs
>
>
> > Regards,
> > Adrien SIPASSEUTH
> >
> >
> >
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users