Hi Libor,

Thanks for the advice, that appears to have done the trick.  Much appreciated!

The original logic for the unsafe setting transition, as I understand, was due to the effect of the DDoS, the signing host had started falling behind with signing gradually to the point it missed a signing cycle and started throwing errors/refusing to sign the zone entirely, which then led to the

We are out of the woods for now it seems, but we'll likely need to work on followup in the coming days/weeks and future mitigation plans, perhaps including some of the tuning you mentioned.  Randy will likely follow up separately, I think his mail server and DNS should be back up and resolvable by now.

Thanks again, just wanted to drop a quick note of appreciation.

On 2024-06-12 15:52, libor.peltan via knot-dns-users wrote:
Hi Korry, Randy,

    Manual: On
    Delete-Delay: 30d
    Unsafe-Operation: No-Check-Keyset
     ...

What is the original point in using unsafe operation within your zones?

In general, your key set is probably broken. As a result of the unsafe-operation settings, Knot ignores the issue and tries to sign the zone somehow, which however does not lead to good result in this situation.

(Anyway, the delete-delay has no effect in manual policy.)


     # keymgr psg.com list
     649b0d43d1493dd4ad30f8043ca4561c33c38b5a 53567 KSK RSASHA256/2048 publish=1078099200 active=1078099200      173597db4b4f2f072b568cb637710e891ac52246 25843 ZSK RSASHA256/2048 publish=1709251200 active=1709251200 retire=1717977600 remove=1717977600      3194d896f2a64f10b103991e5018b72cd3f1cd28 59161 ZSK RSASHA256/2048 publish=1709251200 active=1709251200 retire=1717977600 remove=1717977600      7b1bf414b34f605c68f9ddb7b52c32c6b53da8d3  5489 KSK RSASHA256/2048 publish=1718161132      902b8e02a5e75754bd69791735e76cb11c3e37af 22090 ZSK RSASHA256/2048 publish=1718161132


There are two ZSKs already retired by far, no problem with them. Than there is a KSK in active state. Do you actually expect this a to be a CSK, signing both the DNSKEY and the rest of the zone? Besides this, there is one KSK and one ZSK in "published" state, which means that they are not used for signing.

I'd recommend you to clean up you keyset. The most straightforward way would be to make the existing published ZSK active (keymgr psg.com. set 902b8e02a5e75754bd69791735e76cb11c3e37af active=+0). Than decide what to do with the second  published KSK (delete or what?). And finally, maybe deleting the old keys might be good idea, depending on their purpose.

Please let us know how you proceed with this issue.

Anyway, we are somewhat interested in your experience from under-DDoS operation. How severe they are and how they are affecting your authoritative DNS service? Maybe there would be good point in trying out XDP if the circumstances allow it?

Thanks,

Libor

--

--
Korry Luke
ルーク, コリー
[email protected]
Graduate School of Media and Governance
Keio University Shonan Fujisawa Campus
慶應義塾大学湘南藤沢キャンパス 政策・メディア研究科

--

Reply via email to