Hi

Using BIND-9.16.22:
After some tests with the new KASP feature, I'm running in a issue, where BIND isn't signing the zone anymore.

In the old fashion way (auto-dnssec maintain;), I was able - under some circumstances - to remove the ".signed" and ".signed.jnl" and .jnl-files, restart BIND and everything was fine, the zone was signed automatically with the existing keys.

In the special case now, I removed the ZSK key files and removed all .signed and .signed.jnl and .jnl-files for a zone (like in the old way). The KSK is still existing, a new ZSK is created through the "dnssec-policy":


## Newly created ZSK through dnssec-policy
$ cat Kexample.ch.+013+27534.state
; This is the state of key 27534, for example.ch.
Algorithm: 13
Length: 256
Lifetime: 604800
KSK: no
ZSK: yes
Generated: 20211129062825 (Mon Nov 29 07:28:25 2021)
Published: 20211129062825 (Mon Nov 29 07:28:25 2021)
Active: 20211129062825 (Mon Nov 29 07:28:25 2021)
Retired: 20211206062825 (Mon Dec  6 07:28:25 2021)
Removed: 20211216073325 (Thu Dec 16 08:33:25 2021)
DNSKEYChange: 20211129062825 (Mon Nov 29 07:28:25 2021)
ZRRSIGChange: 20211129062825 (Mon Nov 29 07:28:25 2021)
DNSKEYState: rumoured
ZRRSIGState: hidden
GoalState: omnipresent

$ cat Kexample.ch.+013+27534.key
; This is a zone-signing key, keyid 27534, for example.ch.
; Created: 20211129062825 (Mon Nov 29 07:28:25 2021)
; Publish: 20211129062825 (Mon Nov 29 07:28:25 2021)
; Activate: 20211129062825 (Mon Nov 29 07:28:25 2021)
; Inactive: 20211206062825 (Mon Dec  6 07:28:25 2021)
; Delete: 20211216073325 (Thu Dec 16 08:33:25 2021)
example.ch. 3600 IN DNSKEY 256 3 13 3YU6kADe6IRhJ2rcmHOrPgH6tq/7PQQP7VpLBA70p/bPQFPRagdxuGdl XrDg7tQ9WTr553BA5dUGqRBEYYQTUw==



## Already existing KSK
$ cat Kexample.ch.+013+61416.state
; This is the state of key 61416, for example.ch.
Algorithm: 13
Length: 256
Lifetime: 0
KSK: yes
ZSK: no
Generated: 20211012145017 (Tue Oct 12 16:50:17 2021)
Published: 20211012145017 (Tue Oct 12 16:50:17 2021)
Active: 20211012145017 (Tue Oct 12 16:50:17 2021)
PublishCDS: 20211012145017 (Tue Oct 12 16:50:17 2021)
DNSKEYChange: 20211118133245 (Thu Nov 18 14:32:45 2021)
KRRSIGChange: 20211118133245 (Thu Nov 18 14:32:45 2021)
DSChange: 20211118133245 (Thu Nov 18 14:32:45 2021)
DNSKEYState: omnipresent
KRRSIGState: omnipresent
DSState: omnipresent
GoalState: omnipresent


$ cat Kexample.ch.+013+61416.key
; This is a key-signing key, keyid 61416, for example.ch.
; Created: 20211012145017 (Tue Oct 12 16:50:17 2021)
; Publish: 20211012145017 (Tue Oct 12 16:50:17 2021)
; Activate: 20211012145017 (Tue Oct 12 16:50:17 2021)
; SyncPublish: 20211012145017 (Tue Oct 12 16:50:17 2021)
example.ch. IN DNSKEY 257 3 13 bT4QClt+P9+t1+vF/Ulj7DSISBVMV86TktfNqheiUVGqfZ2hsEpYP140 flVurgV17M/nzujoMW0KgyTuP3p4Kw==




## BIND detects the already existing KSK, but logs a warning the the KSK is missing or inactive. 29-Nov-2021 07:28:25.653 dnssec: info: keymgr: DNSKEY example.ch/ECDSAP256SHA256/27534 (ZSK) created for policy thewaytogo-faster 29-Nov-2021 07:28:25.654 dnssec: info: Fetching example.ch/ECDSAP256SHA256/61416 (KSK) from key repository. 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY example.ch/ECDSAP256SHA256/61416 (KSK) is now published 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY example.ch/ECDSAP256SHA256/61416 (KSK) is now active 29-Nov-2021 07:28:25.654 dnssec: info: Fetching example.ch/ECDSAP256SHA256/27534 (ZSK) from key repository. 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY example.ch/ECDSAP256SHA256/27534 (ZSK) is now published 29-Nov-2021 07:28:25.654 general: info: CDS for key example.ch/ECDSAP256SHA256/61416 is now published 29-Nov-2021 07:28:25.654 general: info: CDNSKEY for key example.ch/ECDSAP256SHA256/61416 is now published 29-Nov-2021 07:28:25.659 dnssec: info: zone example.ch/IN (signed): next key event: 29-Nov-2021 09:33:25.641 29-Nov-2021 07:28:25.660 general: warning: zone example.ch/IN (signed): Key example.ch/ECDSAP256SHA256/61416 missing or inactive and has no replacement: retaining signatures.




## But the KSK (61416) is existing and seems signing
$ rndc dnssec -status example.ch
dnssec-policy: thewaytogo-faster
current time:  Mon Nov 29 09:10:42 2021

key: 61416 (ECDSAP256SHA256), KSK
  published:      yes - since Tue Oct 12 16:50:17 2021
  key signing:    yes - since Tue Oct 12 16:50:17 2021

  No rollover scheduled
  - goal:           omnipresent
  - dnskey:         omnipresent
  - ds:             omnipresent
  - key rrsig:      omnipresent

key: 27534 (ECDSAP256SHA256), ZSK
  published:      yes - since Mon Nov 29 07:28:25 2021
  zone signing:   no

  Next rollover scheduled on Mon Dec  6 05:23:25 2021
  - goal:           omnipresent
  - dnskey:         rumoured
  - zone rrsig:     hidden



So, BIND detects the already existing KSK and ZSK, but is not able to sign the dnskey-rrset with the KSK or some TXT-records with the ZSK.


## DNSKEY RR are existing, the RRSIG is missing
$ dig +short @127.0.0.1 +norec +dnssec dnskey example.ch
256 3 13 3YU6kADe6IRhJ2rcmHOrPgH6tq/7PQQP7VpLBA70p/bPQFPRagdxuGdl XrDg7tQ9WTr553BA5dUGqRBEYYQTUw== 257 3 13 bT4QClt+P9+t1+vF/Ulj7DSISBVMV86TktfNqheiUVGqfZ2hsEpYP140 flVurgV17M/nzujoMW0KgyTuP3p4Kw==


The dnssec-policy looks like this:
dnssec-policy "thewaytogo-faster" {
    signatures-refresh 5d;
    signatures-validity 14d;
    signatures-validity-dnskey 14d;
    dnskey-ttl 3600s;
    publish-safety 1h;
    retire-safety 1h;
    purge-keys 30d;
    keys {
        ksk lifetime unlimited algorithm ecdsap256sha256;
        zsk lifetime 7d algorithm ecdsap256sha256;
    };
    zone-propagation-delay 300s;
    max-zone-ttl 86400s;
    parent-propagation-delay 1h;
    parent-ds-ttl 3600;
};



When running "rndc sign example.ch", then nothing happens -> I'm not sure, if "rndc sign" is still possible with "dnssec-policy"...?

Any hints, how I can recover this state to a working signing-state without recreating a new KSK? I assume, that disabling DNSSEC completely and creating a new ZSK/KSK will work, but in the case now, I already have the mentioned KSK (61416).

Thank you.
Kind regards,
Tom
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to