Grrrr....just noticed that about 12 hours ago, the business office person finally update our KSK with registrar. (where window was last month.)

Well, apparently history must repeat....

3 years ago, we rolled over from RSASHA256 to RSASHA256... but the person that did all the interaction with registrars....where the criteria is that they be in position to pay as needed (which did used to be dns administrator/department manager/etc....but when they left the new manager he didn't want us to continue to have that responsibility...but would've taken it...anyhoo) They selected algorithm type as RSASHA1-NSEC3...

Which caused a bit of an outage, especially since they went on vacation right after having left it to the last minute. we had a 60 day rollover window)...original I had gone around end of fiscal year, but decided to shift it...


Well, this time....still going RSASHA256 to RSASHA256.... (I had done the roll from RSASHA1-NSEC to RSASHA256 before it was possible to register do such things with registrar...so only DLV was involved....though I did run into a problem since I had a DS record in my zone, etc. the mismatch doing one than the other apparently was the wrong way to go...or soemething.)

So this time...RSASHA1 (#5) got selected.

--------------------------

So about tsig sharing a zone....

Is something like this right? (ignoring any typos ;)

==================================================

  key "external" {
      algorithm hmac-sha1;
      secret "xxxx";
  }

  key "internal" }
      algorith hmac-sha1;
      secret "yyyy";
  }

  options {
    notify explicit;
    allow-trasnfer { none; };
  }

acl k-state { 129.130/16; 10.130/16; 10.131/16; 10.132/16; ... 10.139/16; 172.21/16; 192.168.x.0/24; 10.0.0.0/24; };

  acl internal { !key external; key internal; k-state; };
  acl external { !key internal; key external; any; };

  view "internal" {
      match-clients { internal; };

      allow-transfer { key internal; };

      zone "ksu.edu" {
         type master;
         file "pri/ksu.campus.signed";
         allow-transfer { key internal; int-secs; };
         also-notify { 129.130.x.x; 129.130.x.y; 129.130.x.z; };
      }
      zone "ads.ksu.edu" {
         type slave;
         file "sec/zone.ads.ksu.edu";
         masters { 127.0.0.1 key external;
                   129.130.y.y;
                   129.130.y.z;
         };
         multi-master yes;
         also-notify { 127.0.0.1 key external };
      };
   };

   view "external" {
       match-clients { external; };

       allow-transfer { key external; };

       zone "ksu.edu" {
           type master;
           file "pri/ksu.edu.signed";
           also notify { 129.130.139.150 key external;
                         129.130.139.151 key external;
                         129.130.254.21 key external;
           };
       };
       zone "ads.ksu.edu" {
           type slave;
           file "ext/zone.ads.ksu.edu";
           masters { 127.0.0.1 key internal; };
           also notify { 129.130.139.150 key external;
                         129.130.139.151 key external;
                         129.130.254.21 key external;
           };
      };
  };

==================================================

I think that's what I'm thinking....though been so long since I too break from monitor that I can barely see now....

--
Who: Lawrence K. Chen, P.Eng. - W0LKC - Sr. Unix Systems Administrator
                                   with LOPSA Professional Recognition.
For: Enterprise Server Technologies (EST) -- & SafeZone Ally

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to