We have a hidden master doing DNSSEC on our zones, and I've observe the following problem when doing a ZSK rollover.

Zones are updated from our database using DDNS, and bind of course is (re)generating the signatures at the standard intervals.

I first create and publish a new ZSK with no activation date. After waiting the requisite amount of time, I use dnssec-settime:

dnssec-settime -A K<newid>
dnssec-settime -I K<oldid>
rndc sign <zone>

...and bind immediately starts using the new key for sigs. After 0.75*30 days, all the RRSIG with the old key have been replaced except for one - the RRSIG on the zone apex DNSKEY record. Unfortunately, this RRSIG is not regenerated, or removed; it expires, and causes various monitoring tools (including the ISC DLV web UI) to complain.

Is this a bug in bind 9.7.0 which is fixed in a later version?

(I'm aware we should upgrade the hidden master anyway, but since it's hidden it has limited vulnerability, and it's something I like to be cautious with!)

Cheers,
Phil
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to