TL;DR use ECDSA, single algorithm https://tools.ietf.org/html/rfc8624
-- Ondřej Surý ond...@isc.org > On 11 Oct 2019, at 08:38, ego...@sarenet.es wrote: > > Good afternoon, > > I would like to ask you some questions about DNSSEC, which I have not been > able to clarify by my own, reading documentation or testing… they are these > ones : > > - Is it important or should be signed the whole zone with a “compatible" > algorithm as SHA1 and with a stronger one like SHA256 or is it just ok with > SHA256?. I would like to avoid the fact that a resolver could have issues > validating rrsets… I have seen root servers DS has algorithm id 7. Perhaps is > this one the most compatible algorithm for using in DNSSEC?. The most > recommended?. Perhaps we should just use for all keys algorithm 7 as have > seen some root servers use?. Use ECDSA, it’s well-supported. > - If I wanted to sign a zone for instance in 5 and 7 algorithm (if it’s > advisable, as isc.org for instance is signed with two algorithms), should I > run dnssec-sigzone twice and/or perhaps with two different keys?. Can the > same key converted to one kind of key to another (from sha1 to sha256 or > sha256 to sha1) for this purpose?. I have seen isc.org does double signing > with two different algorithms so… what is the recommended practice here?. It’s not advisable. It just increases the response size. > - I have seen the procedure of key rolling over. I have seen there is a > manual procedure. Perhaps the most advantageous aspect of manual handling of > zone signing, can be that you can revoke privileges to Bind to read the > private keys?. I say it, because you generate as root for instance, a signed > zone file and then you just serve it as a master zone… and perhaps the > flexibility you have with it?. Could you please rephrase? I don’t know what you are asking about... For the rest, I would recommend using inline-signing with auto-dnssec and dnssec-keymgr tool from BIND distribution to manage the keys, and set some reasonable times for ZSK rollovers (1 year+). Roll keys only if there’s a security breach. There’s no cryptographic need to roll the keys if you pick ECDSA. If there will be, you will get that in the news :), and we’ll be in much bigger troubles than broken DNSSEC. > - By the way, I have seen that exists too the possibility of a slightly less > complicated way of signing a zone, the dynamic one, but… you have to update > the zone as a dynamic zone with nsupdate for including in the zone the > DNSKEYS and you need to manage by your own equally the key regeneration (the > keys files generation with dnssec-keygen) for avoiding having your zone > signatures expired, am I wrong?…. I think that instead of using this method, > perhaps could be better to use inline signing method instead (if you decide > discarding totally manual method…)?… which by the way… allows you to not > having a ”real” “declared” dynamic zone… with dynamic updates… but… in either > dynamic key roll over method, do you have equally to create by your own, new > keys (mainly talking now about ZSK because KSK needs to update DS in the root > servers) in the key directory of the zone for resigning the zone?. The > recommended method for that is dnssec-keygen -S?. > > - It seems inline signing method of key rolling over does not allow you to > choose the key rolling over method?. How does, inline-signing manage the zone > sign in the terms of which key algorithm, rollover method and so, does use?. > > - Do you have a minimum time a zsk should be enabled?. I say it, because even > setting the zsk key this way : > > ; This is a zone-signing key, keyid 45018, for seranet.es. > ; Created: 20191010111754 (Thu Oct 10 13:17:54 2019) > ; Publish: 20191010111754 (Thu Oct 10 13:17:54 2019) > ; Activate: 20191010111754 (Thu Oct 10 13:17:54 2019) > ; Inactive: 20191010131754 (Thu Oct 10 15:17:54 2019) > ; Delete: 20191010151754 (Thu Oct 10 17:17:54 2019) > seranet.es. IN DNSKEY 256 3 8 > AwEAAdrLnpJilOPdAh8Y1LLPpLCB+600MqhwuaEVYYQ4wWMXdl+JaeFm > wUIVUd3BSR+qz034t7VT/8rtIzc6jXaoOjqvIbnS5NMje49503Fikt7X > WwST61AhtghrGFl6Wl27E3WT5s3IlJFDUo1efLy0E18qm5Q8JPkt38zI BJ9339HL > dig seranet.es a +dnssec > > ; <<>> DiG 9.10.6 <<>> seranet.es a +dnssec > ;; global options: +cmd > ;; Got answer: > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8734 > ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1 > > ;; OPT PSEUDOSECTION: > ; EDNS: version: 0, flags: do; udp: 4096 > ;; QUESTION SECTION: > ;seranet.es. IN A > > ;; AUTHORITY SECTION: > seranet.es. 300 IN SOA ns1.sarenet.es. > dnsmaster.sarenet.es. 2019101005 86400 7200 2592000 300 > seranet.es. 300 IN RRSIG SOA 8 2 300 20191109151754 > 20191010141754 38689 seranet.es. > FCG4zWvtZ3/DfnKuAj+O9drdVFGkmoyGY8PssnMLGG3G5yf0GIXu4dob > r/i/BBuV+Y8gtcrbAWRD7TwlWYId6Rlazwn80MJncGH1JVMVtcJIfM+E > 8sq6yWBhHkswUX0UCwFpu1/cNg0vKad7VMxtW4ycZEcN3+NnWyU+yT+L > g7usDNd6kEB/fsO+9Z3ioCBS0wGzW3Kv/SOlmkhiHkux+Eg/X97G8f8C > 1BUXpEtJ/SGY715q+XYn78SowQQ5GjgI2EVgG8qgNFu6zlex2HX8US7T > mL62Lu0FS4TNMTPAstiFmEXn4nOAf86jE1IeYLdMGpTd+LOUHM1yOgKn IuAS6Q== > H4MU3S6CAIE18L011AOHNRKSD5FBVEAB.seranet.es. 300 IN RRSIG NSEC3 8 3 300 > 20191105235142 20191010141754 38689 seranet.es. > AfCHv2pcGq2bXP9/nRwe7s4g1zBavup1YsbHRF7qhZf5luC3OqnHII+N > 2Hz2Gv58/35R+l2tDdEQerzgRF7jOy60sdVRStUX9gmuLUoYgcAUm9dg > R52E7QnN0DMvgGwn1ET1JxLzCJ15fCK+rsnkBh7ZKousmMgt7a1psjwM > VzcgYsrkBdhv6rNPLEfifbz0X3G+KmdToXIkejkcig+O8jtO2eBGuHfA > 7RW2ByH44x6Kw1QGHtg1a+KvgD1R0fpRDH0svuivzKF4fb9YYpviipNV > x5MsAduESxm4PviqRTrRfUSC9eJ9Zx08Nr8qh3VRt+TmZtZFJ2p737Sn H+vp6g== > H4MU3S6CAIE18L011AOHNRKSD5FBVEAB.seranet.es. 300 IN NSEC3 1 0 100 1CA7B3AC > V4LV1AUI40OATTPVFINRGQMESCHEUE1F NS SOA MX RRSIG DNSKEY NSEC3PARAM > > The RRSIG sais as expiration date 20191109151754... > > - The revoke state of a key, it’s just for emergencies when the private key > of the key pair has been compromised?. I mean, the only states you usually > see in a key are, published, activate, inactivate and delete?. > > - Perhaps the most proper way of handling dnssec is to just use something as > : > > zone "seranet.es" { type master; inline-signing yes; key-directory > "/expert/keys/es-domain/named.seranet"; auto-dnssec maintain; file > "es-domain/named.seranet"; }; > > as zone config in Bind, and let inline-signing doing it’s job?. Will it > manage the proper algorithms, rollover methods and so?. If I used this > method, we should just have to ensure, that in the key directory we always > have a ready inactive key, for rolling over in the needed date and Bind would > perform all zone signing tasks (except obviously tell registrar new DS)?… but > even will it handle KSK roll over?. > > > Thanks you so much in advance… There are questions I have not been able to > answer by reading books and at the Internet… > > Best regards, > > > > Egoitz Aurrekoetxea > Dpto. de sistemas > 944 209 470 > Parque Tecnológico. Edificio 103 > 48170 Zamudio (Bizkaia) > ego...@sarenet.es > www.sarenet.es > > Antes de imprimir este correo electrónico piense si es necesario hacerlo. > > _______________________________________________ > Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe > from this list > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users