Paul van der Vlis <p...@vandervlis.nl> wrote:
>
> Is it possible to sign the ZSK key permanently with the KSK key?
> In this way I could keep the KSK key offline.

The only(*) revocation mechanisms in DNSSEC are expiring signatures and
replacing keys. If you sign your DNSKEY records permanently, when anyone
manages to compromise them they will be able to spoof records in your zone
until you replace the KSK.

In effect, what you will have done is coupled the keys together
permanently so they are of equivalent power, and eliminated all benefit of
keeping the KSK offline.

The point of an offline KSK is to allow you to recover from compromise of
your ZSK without having to replace your DS records or other trust anchors.

It's worth having a look at how the root DNSKEY RRset is managed: they get
the KSK out of storage a few times a year, when they generate RRSIG
records for the next few months.


(*) The other mechanism is the RFC 5011 revoked bit, which only applies to
KSKs that are being tracked as auto-updating trust anchors (managed-keys
etc.) but that doesn't apply to other records that depend on signature and
key rotation for revocation.

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
justice and liberty cannot be confined by national boundaries
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to