If you want to test behaviour with expired records you are going to need to use 
dnssec-signzone.
The tests that ship with BIND use dnssec-signzone to build zones with out of 
date signatures.

As for dnssec-policy it is not designed to produce broken zones.

Mark

> On 11 Feb 2025, at 10:18, John Thurston <john.thurs...@alaska.gov> wrote:
> 
> Trying to kick this football, I delegated a zone (z.ak.gov) to one of my test 
> servers, by adding a record to ak.gov
> z.ak.gov. IN NS ns88.state.ak.us
> And on the ns88 server, I created a zone file with an SOA, NS, A, and a TXT 
> record. I defined it with a basic zone-statement:
> zone "z.ak.gov" { type primary; file "z.ak.gov"; };
> and confirmed my delegation worked, and that it would answer correctly.
> Then I added " dnssec-policy default; inline-signing yes;" to my zone 
> statement, reloaded the zone, and used rndc dnssec -status z.ak.gov to see 
> that it was happy. I could still dig the records I had entered. If I added 
> +dnssec to my dig I saw the RRSIG record. If I used delv I would get an 
> 'unsigned answer'. If I used delv, and made it reference an anchor-file of my 
> own making
> delv @ns88.state.ak.us -a ./z.ak.gov.key +root=z.ak.gov. z.ak.gov. SOA
> I could get a fully-validated answer. Yay!!
> The zone ak.gov is not signed, so while I could publish a DS-record there, I 
> suspect delv won't accept it while performing its validation work. I expect 
> that naming my .key file as an anchor is just as good as letting delv find a 
> validated DS record in a.gov (for the purposes of learning how 9.18 and 9.20 
> validating resolvers differ).
> But now I think I'm stuck. I think the default dnssec-policy isn't going to 
> let me force a re-signing in a way which will leave expired RRSIG records 
> behind (which is what I'm trying to test). I suspect I'm going to have to
>     • switch to manual signing
>     • define a long TTL for my zone
>     • sign the zone with a key with a short longevity
>     • get the long TTL RRSIGs cached in my resolvers
>     • after RRSIG is invalid, shorten the TTL on the zone
>     • re-sign the zone
>     • find both the new and the old RRSIG in my resolvers
> Is there a simpler way to force an expired RRSIG into a response-set?
> 
> --
> Do things because you should, not just because you can. 
> 
> John Thurston 907-465-8591
> john.thurs...@alaska.gov
> Department of Administration
> State of Alaska
> On 2/7/2025 12:50 PM, John Thurston wrote:
>> Right now, the only way I can think to nail down this behavior is to:
>>     • delegate a subdomain to myself
>>     • sign it
>>     • intentionally publish an expired RRSIG in it
>> Which makes my next question:
>>     Will BIND even let me do this? Or will it the automation rake out the 
>> expired records and refuse to serve them
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to