Hi Ondrej. THANK YOU.
I understand what you have suggested.
I considered that earlier : it would've increased 1 more server
rent cost, and additional setup, maintenance/update, etc times, ...
and during consideration i was using a dnssec-policy opPolicy2W
with KSK changing every 20 days, & ZSK every 10 days.
Now I changed to another dnssec-policy opPolicy3M : KSK changing
every ~ 3 months & ZSK every 22 days.
Those who uses keys with longer validity period, for such cases,
this single master/primary (additional server) solution is easy &
better.
On the other hand, if single master/primary nameserver is used, &
if it go/stay down (for longer time), at key add/remove scheduled
time, ... that can cause problems receiving current replies from
slave/secondary nameservers.
and this also needed nameserver to nameserver data-transfer related
secure key/channel.
so single master/primary is indeed a single-point-of-failure.
To overcome, i would need to backup the zone/key etc files
elsewhere, (to allow me to start a new single master/primary
nameserver, in such case of long delay/down time).
So why not backup in a shared online storage, that is also mounted
inside each nameserver ? as that is surely better.
and i also needed the same KSK (and ZSKs) available in other
nameservers, so again a shared online storage is needed.
But that shared online storage can also be a single-point-of-failure.
...
So these ... very easily deduct/indicated : i needed a shared
online storage that is INSIDE EACH SERVER itself , NOT-OUTSIDE.
And server is copying/overwriting + syncing/replicating, & keeping
the last edited files, into same storage mount-point.
in that way ... it is NOT-a-single-point-of-failure.
instead, by itself fully sufficient to run+perform DNSSEC activities.
just small size 300 MB to 1 GB shared space/volume/directory inside
each nameserver is sufficient, for this DNS/DNSSEC purpose.
And thats why+what i have done.
operator/user can create shared directory inbetween their servers
with various methods, that is op's/user's choice.
I added extra info to make a point its completely & easily doable,
& can also be secure (TLS encrypted).
I did this shared-directory earlier with SSH secure tunnel based
copy/syncing method.
The end result need to be a Shared/Synced/Replicated COMMON storage
Directory/Volume/mount-point, for BIND, inside each nameserver.
I needed 3 servers located in 3 different geo location for users
data privacy jurisdiction & separation.
Thanks in advance.
Erik.
Erik T Ashfolk.
On 9/26/24 8:13 PM, Ondřej Surý wrote:
Hi Erik,
whatever you did below is complicated, unnecessary, and prone to break.
Just create one hidden primary that will do the signing and two to three public
secondaries that are independent of each other.
Then setup DNSSEC in a way that it’s ok for the primary to be down for a
specified period of time, so you don’t have to wake up in the middle of the
night, e.g. the signatures should be long enough and be resigned at least a
weak before expiration.
The DNS itself can handle a failure of the secondaries itself.
Sure, if you want to be fancy, you can do a local VRRP at each secondary site,
or use anycast for each primary, but since you are hosting “example.com” I
don’t think it matters much.
Ondrej
--
Ondřej Surý — ISC (He/Him)
My working hours and your working hours may be different. Please do not feel
obligated to reply outside your normal working hours.
On 27. 9. 2024, at 4:27, TErik Ashfolk <ate...@outlook.com> wrote:
<snip>
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from
this list
ISC funds the development of this software with paid support subscriptions.
Contact us at https://www.isc.org/contact/ for more information.
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users