In message <5268626c.8040...@networktest.com>, David Newman writes: > On 10/23/13 4:28 PM, Mark Andrews wrote: > > You sign all versions of the zone. > > > > As for key management you can: > > > > * use the same keys in all views which makes mobile device > > management simpler as there is no need to distribute keys. > > Validating from the root will work in all cases though > > there is still something to be said for distributing keys > > for local zones locally as this prevents resolution > > failures when the site is disconnected from the rest of > > the world. > > > > * different keys per view. You will need to distribute the > > keys and for mobile devices they will need all sets of > > keys as they see both the internal and external views > > depending apon where they attach to the network and whether > > there is a VPN active. For fixed devices different keys > > will cause data leakage to be rejected as the leaked data > > won't validate. > > > > You can change strategy if you pick the wrong one. > > Thanks, makes sense. > > What about delegation? Right now, there is none between external zones > and internal forward zones using RFC 1918 addresses. > > I *think* option 1 would require, for example, example.org's zone to > include delegation and glue records for internal.example.org to keep the > chain of trust intact. > > And I *think* option 2 in theory could be set up as an island of trust, > with no delegation from parent domains.
You can * add the delegation for internal.example.org to example.org and make it visible to the world with a appropriate acl on internal.example.org. * have two version of example.org, one with and one without the delegation for internal.example.org. * you can add a trust anchor for internal.example.org. As more validation takes place in applications the first two will be easier to mangage. > True? > > Thanks again > > dn > > > > > Mark > > > > In message <526857a2.8050...@networktest.com>, David Newman writes: > >> What is the recommended practice for adding DNSSEC to an environment > >> that currently uses split DNS? > >> > >> Apologies as I'm sure this has come up before, but most discussion I > >> found on bind-users was from 1999, and this isn't covered in the ARM. > >> > >> I did find this draft (not RFC) from 2007, but even the author > >> acknowledges that some examples given can invite misconfiguration: > >> > >> http://tools.ietf.org/html/draft-krishnaswamy-dnsop-dnssec-split-view-04 > >> > >> On the surface, split DNS and DNSSEC have seemingly opposite goals: One > >> seeks to provide different responses to queries for the same resource, > >> and the other seeks to prevent it. > >> > >> Is there some way of reconciling these? > >> > >> Thanks > >> > >> dn > >> > >> _______________________________________________ > >> Please visit https://lists.isc.org/mailman/listinfo/bind-users to > >> unsubscribe from this list > >> > >> bind-users mailing list > >> bind-users@lists.isc.org > >> https://lists.isc.org/mailman/listinfo/bind-users > _______________________________________________ > Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe > from this list > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users