TL;DR Don't do this. It is not going to work as the origin of the RRSIG would different.
gitlab.isc.org. 7200 IN A 52.201.58.154 gitlab.isc.org. 7200 IN RRSIG A 13 3 7200 ( 20241222045850 20241208044609 27566 isc.org. V1qzQZGbfd7XiEjcylcTESXkMF1D7+nRh3MocRAOqtkS X+75a/sojGkDmoaaxYpZoJzU9GHkzmnilrz/3k5b0A== ) See the little 'isc.org'? That needs to match the zone, and it is going to contain bar.example.com <http://bar.example.com/> instead of example.com <http://example.com/> if the subdomain is correctly signed. Ondrej -- Ondřej Surý (He/Him) ond...@isc.org My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours. > On 10. 12. 2024, at 20:07, Nick Tait via bind-users > <bind-users@lists.isc.org> wrote: > > Just an idea, but what if you copy the current ZSK key files from the > example.com zone and rename the files (i.e. add “bar” into the filenames) so > it will be picked up by the bar.example.com zone? In theory that should > populate bar.example.com with the correct RRSIG records prior to removing the > split? > (BTW just check that example.com ZSK lifetime is long enough to implement all > this before you start.) > > Nick. > >> On 10 Dec 2024, at 10:12 PM, Petr Špaček <pspa...@isc.org> wrote: >> >> Hello Chris. >> >> My take is that the *will* be some sort of breakage even if you do >> everything right with shortest possible TTLs - because this is the DNS, >> eventually consistent by design, and wildly misimplemented in practice. So >> don't feel bad when some breakage occurs :-) It will very much depend on >> your client population, which presumably you don't have control over. >> >> Anyway, I would say that going to 1 second TTL for NS/SOA/DNSKEY/DS/NSEC* >> RRs first is a good idea - for the records below the (to-be-removed) zone >> cut. >> >> In theory RRs above the cut can have the "target" TTLs right away, but if >> you are concerned about breakage you might want to lower TTLs just in case, >> so you have flexibility to react. (But be prepared for clients which don't >> respect TTL ...) >> >> >> To your questions about names which are in the parent zone but (currently) >> below (the old) zone cut - these will not get signed and not show up in the >> NSEC* chains because they are occluded/not authoritative in the parent zone. >> >> Let us know how it vent, maybe there will be a lesson to learn for everyone! >> (Also if it just works - that's useful information as well!) >> >> HTH. >> Petr Špaček >> Internet Systems Consortium >> >> >>> On 10. 12. 24 7:48, Ondřej Surý wrote: >>> Chris, that depends whether both are on the same nameservers or not. If not >>> then you can just fold first and then wait out the TTLs. If yes then it can >>> get hairy and I would suggest to reduce the TTL on the delegation records >>> to some small number (in the order of minutes). Perhaps also reduce TTL on >>> SOA and DNSKEY records just to be sure nothing stays in the cache for too >>> long. >>> Then before the change I would change those TTLs to 0, wait out the >>> previous TTL, and then again just fold the data, and the resolvers should >>> immediately switch to new chain. >>> Ondrej >>> -- >>> Ondřej Surý — ISC (He/Him) >>> My working hours and your working hours may be different. Please do not >>> feel obligated to reply outside your normal working hours. >>>>> On 10. 12. 2024, at 7:27, Crist Clark <cjc+bind-us...@pumpky.net> wrote: >>>> >>>> >>>> We have a zone, "bar.example.com <http://bar.example.com>," that is all >>>> properly delegated from "example.com <http://example.com>." Although the >>>> subzone still has many records, "foo.bar.example.com >>>> <http://foo.bar.example.com>" and such, the administrative reasons for >>>> having it as a separate zone are not so important anymore, and it would be >>>> convenient to simply manage it as multi-label names all within the >>>> example.com <http://example.com> zone. That is, foo.bar.example.com >>>> <http://foo.bar.example.com> would now just be in example.com >>>> <http://example.com>. >>>> >>>> The first thing that ups the degree of difficulty is DNSSEC. example.com >>>> <http://example.com> is signed. bar.example.com <http:// bar.example.com> >>>> is properly delegated and also signed. How do we make the transition >>>> without invalidating bar.example.com <http:// bar.example.com> and its >>>> contents? I can't think of a way to transition bar.example.com >>>> <http://bar.example.com> without going insecure, letting that propagate >>>> out, and then folding bar.example.com <http://bar.example.com> into >>>> example.com <http://example.com>. Or is there some way we could do it >>>> without going insecure first? >>>> >>>> I am also a little concerned about pre-loading the multi-label names at >>>> bar.example.com <http://bar.example.com> and above into example.com >>>> <http://example.com>. example.com <http://example.com> and bar.example.com >>>> <http://bar.example.com> have the same NS records, the same servers. Could >>>> it present any issues having those "hidden" records and their associated >>>> NSEC3 records in example.com <http:// example.com> while the server still >>>> is serving bar.example.com <http://bar.example.com>? Would we want to go >>>> insecure with example.com <http://example.com> too, just to be safe? >>>> >>>> Even without DNSSEC, there are some problems. If we manage an >>>> instantaneous change on all of the authoritative servers at once, we can >>>> still have cached records out there. You could still have a resolver with >>>> the NS and SOA of bar.example.com <http:// bar.example.com> cached. It >>>> goes to ask for "doesntexist.bar.example.com >>>> <http://doesntexist.bar.example.com>" and gets a NXDOMAIN with an SOA for >>>> example.com <http://example.com> in the auth section. It's expecting the >>>> SOA for bar.example.com <http:// bar.example.com>. A standard-compliant >>>> resolver won't accept that. >>>> >>>> Am I just over-thinking this? Just lower the TTLs on the NS and DS records >>>> for bar.example.com <http://bar.example.com> as far as we dare, and make >>>> the changes and hope for the fewest inconsistencies possible? Are there >>>> some steps to take to do this with minimal chances for inconsistencies and >>>> breakage? >>>> >>>> We're using BIND dnssec-policy to manage DNSSEC for the zones. >> -- >> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from >> this list >> >> ISC funds the development of this software with paid support subscriptions. >> Contact us at https://www.isc.org/contact/ for more information. >> >> >> bind-users mailing list >> bind-users@lists.isc.org >> https://lists.isc.org/mailman/listinfo/bind-users > -- > Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from > this list > > ISC funds the development of this software with paid support subscriptions. > Contact us at https://www.isc.org/contact/ for more information. > > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users