That was very helpful. Thanks.

One last query.  For signed domains registered with and using ISC.ORG trust 
anchor, is there a sanity check similar to what you displayed below?


--- On Thu, 1/28/10, Evan Hunt <e...@isc.org> wrote:

> From: Evan Hunt <e...@isc.org>
> Subject: Re: DNSSEC DSSET & KEYSET
> To: "prock...@yahoo.com" <prock...@yahoo.com>
> Cc: "Florian Weimer" <fwei...@bfk.de>, bind-users@lists.isc.org
> Date: Thursday, January 28, 2010, 10:42 AM
> 
> > Is there a tool/process to verify if the parenet
> domain has DSSET,
> > KEYSET, or keys in place for the child domain? 
> Thanks.
> 
> "dig ds <yourdomain>", and check that a) DS records
> are returned, and
> B) the first field of at least some of the DS records match
> the key ID of
> the key-signing key for your zone.  For example,
> isc.org is using key 12892:
> 
> $ dig +short ds isc.org
> 12892 5 1 982113D08B4C6A1D9F6AEE1E2237AEF69F3F9759
> 12892 5 2
> F1E184C0E1D615D20EB3C223ACED3B03C773DD952D5F0EB5C777586D
> E18DA6B5
> 
> ...so we're fine.
> 
> And of course, you could also configure a validating
> resolver (or drill
> or dig +sigchase) with a trust anchor for the parent, and
> make sure the
> validation process works.
> 
> --
> Evan Hunt -- e...@isc.org
> Internet Systems Consortium, Inc.
> 


      
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to