I'm trying to come up with an interim solution for my ISP's DNS
Recursive Resolver that is DNSSEC aware.

My thoughts so far:-
Use BIND 9.6.1-P3 (this is the latest version named that Gentoo Linux
gives me).
In order to fetch both iTAR and DLV signatures - use a patched version
of WGET that is dnssec aware.

Once a week (is this frequent enough?) fetch the DNSSEC signatures from
iTAR and ISC/DLV, convert the iTAR xml stuff into Signatures, append the
DLV signature and then include this file into my named.conf
configuration.
(named.conf:   include "named.conf.trust-anchors"; )

In named.conf --> options, add:
        dnssec-enable yes;
        dnssec-validation yes;
        dnssec-lookaside . trust-anchor dlv.isc.org.;

This appears to be working for me.
Questions are - how frequently should one fetch these trust-anchors? I'd
have though once a week was enough but have read of situations where
people using ISC's DLV have had past problems.

I'm hoping that by using both iTAR and DLV - that I won't have this
problem - have not noticed anything personally yet.

I call this an "interim" solution - interim until the root is signed
with live data and contains the data that ITAR is currently being used
to store. I don't see ISC's DLV disappearing overnight just because the
root is signed either...

I'm only doing the 'wget-ting' from one location, then distributing
internally from there - in order to reduce loads.

What other suggestions do people have to achieve something similar?

ps - I find the CZ "DNSSEC Validator" (addon) plugin to Firefox very
inspiring! Anyone aware of something similar for IE?

-- 
  .  .     ___. .__      Posix Systems - Sth Africa.  e.164 VOIP ready
 /| /|       / /__       m...@posix.co.za  -  Mark J Elkins, Cisco CCIE
/ |/ |ARK \_/ /__ LKINS  Tel: +27 12 807 0590  Cell: +27 82 601 0496

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to