Hello Andrej,

On 4/16/23 23:08, Andrej Podzimek via bind-users wrote:
Hi bind-users,

I have asked this question on GitLab, but hijacking a closed issue to ask questions is bad practice (often rewarded with silence), so I’m re-posting the question here. https://gitlab.isc.org/isc-projects/bind9/-/issues/3769#note_356577

Sorry, I have missed the earlier comment on GitLab, but you are right, the bind-users list is a better place for such questions.


My DNS server serves multiple views that share zones but resolve their (mostly multi-homed) hosts to different addresses, depending on the view.

The easiest (?) way to make DNSSEC work in all views has been to keep a dnssec-policy for zones in *one* of the views (to generate and maintain keys) and then passively refer to the keys from the zones’ counterparts in other views using auto-dnssec. \o/

Now a log warning message is telling me that auto-dnssec will be removed. /o\

As outlined in the GitLab comment, I have been trying to find a dnssec-policy equivalent of auto-dnssec. Could it be something like this?

          dnssec-policy "ReuseKeysFromTheMainView" {
            keys {
             ksk key-directory lifetime unlimited algorithm ecdsap384sha384;              zsk key-directory lifetime unlimited algorithm ;
            };
            nsec3param salt-length 16;
            publish-safety P1D;
            retire-safety P1D;
          };

When looking for the dnssec-policy equivalent of auto-dnssec, you will need to look at your current zone signing settings to determine the policy.

Look at your current keys and check their algorithm and key length. From your policy excerpt from above it looks like you are using a KSK/ZSK strategy with algorithm ECDSAP384SHA384 (14).

Key rollovers were done outside of BIND9, either manually or scripted. So "lifetime unlimited" makes sense here.

I assume your zone uses NSEC3. If the current salt length is 16, the NSEC3 chain should be maintained.

Furthermore:
- "sig-validity-interval":
  Specifies the number of days a signature is valid. The second optional
  value is the refresh interval. This equivalent of this option are
  the dnssec-policy options "signatures-validity" and "signatures-
  refresh".

- "dnskey-sig-validity": This equivalent of this option is the
  dnssec-policy option "signatures-validity-dnskey".

Other dnssec-policy options are related to key timings when doing key rollovers.



There are at least two concerns:

(1) Will the dependent “unlimited lifetime” views automatically pick up the key updates made by the main “limited lifetime” view (instead of blindly expecting the key files to never change)?

Sorry, I fail to understand what dependent "unlimited lifetime" views are, and what the main "limited lifetime" view is.

Are you perhaps asking how to initiate a key rollover with dnssec-policy?


(2) Which of the additional parameters have to be repeated in dependent “auto-dnssec-like”  zones that don’t generate their own keys?     * The salt-length seems irrelevant (set and fixed at key generation time).     * But how (if at all) will publish-safety and retire-safety work int his strange setup?

What are "auto-dnssec-like" zones? Zones that don't use "dnssec-policy"? In that case, for such zones "publish-safety" and "retire-safety" have no effect.

Best regards,

Matthijs


I may have overlooked something, but could not find this↑ in the documentation. Ideas and documentation pointers (to the best auto-dnssec equivalent) would be very helpful.

Cheers!
Andrej

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to