Hi Andrej,
While I am not 100% sure on your use case, let me at least respond to this:
> But I’m starting to realize that I had misunderstood and
> overcomplicated things; simply referencing the "standard" policy again
> from equivalent zones in different views should (?) magically work (as
> Ni
Hi Matthijs,
Thanks for your response.
dnssec-policy "ReuseKeysFromTheMainView" {
keys {
ksk key-directory lifetime unlimited algorithm ecdsap384sha384;
zsk key-directory lifetime unlimited algorithm ;
};
nsec3param s
On 17/04/23 09:08, Andrej Podzimek via bind-users wrote:
The easiest (?) way to make DNSSEC work in all views has been to keep
a dnssec-policy for zones in *one* of the views (to generate and
maintain keys) and then passively refer to the keys from the zones’
counterparts in other views using a
Hello Andrej,
On 4/16/23 23:08, Andrej Podzimek via bind-users wrote:
Hi bind-users,
I have asked this question on GitLab, but hijacking a closed issue to
ask questions is bad practice (often rewarded with silence), so I’m
re-posting the question here.
https://gitlab.isc.org/isc-projects/bin
Hi bind-users,
I have asked this question on GitLab, but hijacking a closed issue to ask
questions is bad practice (often rewarded with silence), so I’m re-posting the
question here.
https://gitlab.isc.org/isc-projects/bind9/-/issues/3769#note_356577
My DNS server serves multiple views that s
5 matches
Mail list logo