On 11/1/2011 3:02 PM, Phil Mayers wrote:
On 11/01/2011 06:34 PM, Scott Morizot wrote:

Alternatively, you can sign 'policydomain.internal' and configure its key
as one of the trust anchors on the validating name servers. The order of
validation is, if I recall correctly, locally configured trust anchors,
then chain of trust from root, and finally DLVs. So doing that should
provide a successful validation for the domain.

So presumably you could also follow Lyle's suggestion - have a local
"private" zone, signed, with a local trust anchor and an *in*secure
delegation to "policydomain.internal"?
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to
unsubscribe from this list


I would suggest not signing the .internal zone as a private zone and you will be done. Then there is no DNSSEC records to mess with at all.

Again, this has a disadvantage if they ever decide to make .internal a real internet domain name and some people frown upon this practice. Be sure you know what can go wrong.

Lyle Giese
LCR Computer Services, Inc.


_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to