Hi,

On 09-05-2022 10:16, Bjørn Mork wrote:
Michael Richardson via bind-users <bind-users@lists.isc.org> writes:

4) I don't understand the difference between "auto-dnssec maintain;"
    and "dnssec-policy default"  (given that I haven't overridden anything).

I believe the only difference is that the latter will track your keys in
addition to the automatic signing.  And it will auto-generate CDS and
CDNSKEY records.  None of which matters much until you start using it
for automatic rollovers.

'auto-dnssec maintain' will also adjust the DNSSEC keys according to the key timing metadata ('auto-dnssec allow' will only update signatures).

'dnssec-policy' is also able to create new keys when needed and allows you to specify a policy for DNSSEC signing (roughly put: it moves dnssec-keymgr functionality inside BIND).


I am not sure, but I suspect this is because the key didn't match your
dnssec-policy.  So the rollover started immediately when you configured
dnssec-policy, with a fresh KSK generatated and removal of the existing
keys with "wrong" algorithms scheduled.

I suspect so too.

AFAIK, I'm not doing CDS (I'd like to, but I don't know how, and I don't know 
if .org is doing it).

Yes, same here.  This is not a problem. I learned from the discussion
here earlier that BIND will just wait for me to manually tell if about
the DS state using "rndc dnssec -checkds ...".  Which is fine.

What's surprising is that the KSK went missing without you telling BIND
that the DS was removed.  I wonder if the problem is that it started out
already having "DSState: hidden" because of the policy mismatch?

Yes, if BIND thinks the DS is not known to the world, it may remove the DNSKEY record.


- Matthijs
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to