On 2021-04-30 18:14, Havard Eidnes wrote:
Relevant commands:
vi kasp.xml
ods-enforcer policy import
ods-enforcer zone set-policy -z example.com -p newpolicy
ods-enforcer enforce -z example.com
One caveat to think of, I probably wouldn't use this on
combined signing keys (CSKs).
If possible test this first, we've used set-policy but not for
this specific case AFAIK.
Hmm, this probably means that the wiki page at
https://wiki.opendnssec.org/display/DOCS/kasp.xml
with the notice
Once a zone is signed, changes to the algorithm require a
rollover which is not currently handled by OpenDNSSEC. Attempts
to change the algorithm on a policy will result in a warning
message and a request for confirmation.
needs an update? In particular it would seem that "is not
currently handled by OpenDNSSEC" is no longer true?
Yes, that needs updting, I think elsewhere it is explicitly states
to be supported. I think the entire wiki is to be revamped.
I realize this is a wiki, and as far as I recall I do have
editing privileges, so I can do the actual editing, but I'm
hesitating to do that without getting any feedback first.
So ... I tried specifying algorithm 14 (ECDSA P-384) for KSK with
a 1 year rotation, and algorithm 13 (ECDSA P-256) for ZSK with a
1 month rotation. Isn't that supposed to be supported? Or is
there something in the protocol specification which says that you
must have the same algorithm for KSK and ZSK? (I didn't think so.)
Also, no comment on this?
Need to test, this situation. I know some people have transfered to
ECDSA, but haven't been in this process. There is no direct relation
between key algorithms here.
I caved in, and specified algorithm 13 (ECDSA P-256) for both KSK
and ZSK on my test system, and did as specified above: created an
"ecdsa" policy specifying algorithm 13 and then:
ods-enforcer zone set-policy -z urc.uninett.no -p ecdsa
ods-enforcer enforce -z urc.uninett.no
I'm now one week later looking at the state of the keys with
ods-enforcer, and while the new KSK is generated and sits in the
zone, it doesn't look like OpenDNSSEC is doing a KSK roll-over to
complete the algorithm roll-over. Is it waiting for the normal
roll-over time to come for the zone, and *then* doing the KSK
roll-over? That seems counter-intuitive; I would have expected
that when I did "set-policy" and "enforce", it would realize that
I did indeed ask for a KSK with a new algorithm, and that an
automatic roll-over should be initiated immediately instead of
waiting for the normal rotation time previously specified (which
in my case is 1 year). State of the keys for the zone now look
like this:
Yes it is still waiting for a normal rollover period. Could be
a number of parameters in the kasp, such as long SOA or DNSKEY
TTL, publish safety. I'm working on a better insight for the
date of next transition to show why and when a transition for
which key is done. But turned out to be more work.
ods @ test-signer: {16} ods-enforcer key list -z urc.uninett.no -v
Keys:
Zone: Keytype: State: Date of next
transition: Size: Algorithm: CKA_ID:
Repository: KeyTag:
urc.uninett.no KSK active 2021-04-30 17:57:54
2048 8 60c393e7b35db5a0e9cf4a841693858f SoftHSM
46540
urc.uninett.no ZSK retire 2021-04-30 17:57:54
1280 8 1a81c8138fc886c7c84e8ebcd49a386a SoftHSM
9730
urc.uninett.no ZSK ready 2021-04-30 17:57:54
1280 8 4bbb93962f7bce0138c890889bff48b9 SoftHSM
42331
urc.uninett.no KSK publish 2021-04-30 17:57:54
2048 13 1605e5edf3e2c9b022010386419f624a SoftHSM
42582
urc.uninett.no ZSK ready 2021-04-30 17:57:54
1536 13 efd1db8fac425422cc8b5b8ad6837d2b SoftHSM
42185
ods @ test-signer: {17} ods-enforcer key list -z urc.uninett.no -d
Keys:
Zone: Key role: DS: DNSKEY:
RRSIGDNSKEY: RRSIG: Pub: Act: Id:
urc.uninett.no KSK omnipresent omnipresent
omnipresent NA 1 1 60c393e7b35db5a0e9cf4a841693858f
urc.uninett.no ZSK NA omnipresent
NA unretentive 1 0 1a81c8138fc886c7c84e8ebcd49a386a
urc.uninett.no ZSK NA omnipresent
NA rumoured 1 1 4bbb93962f7bce0138c890889bff48b9
urc.uninett.no KSK hidden rumoured
rumoured NA 1 1 1605e5edf3e2c9b022010386419f624a
urc.uninett.no ZSK NA rumoured
NA rumoured 1 1 efd1db8fac425422cc8b5b8ad6837d2b
ods @ test-signer: {18} ods-enforcer key list -z urc.uninett.no
Keys:
Zone: Keytype: State: Date of next
transition:
urc.uninett.no KSK active 2021-04-30 17:58:55
urc.uninett.no ZSK retire 2021-04-30 17:58:55
urc.uninett.no ZSK ready 2021-04-30 17:58:55
urc.uninett.no KSK publish 2021-04-30 17:58:55
urc.uninett.no ZSK ready 2021-04-30 17:58:55
ods @ test-signer: {19}
And, as per usual for OpenDNSSEC2 the "Date of next transition"
no longer means that, apparently.
I'm initially waiting for a "waiting for ds-seen" state here for
the new KSK, and it's not showing up.
Do I have to manually initiate a KSK roll-over with
ods-enforcer key rollover --zone urc.uninett.no --keytype KSK
to get things moving along?
Best regards,
- HÃ¥vard
_______________________________________________
Opendnssec-user mailing list
Opendnssec-user@lists.opendnssec.org
https://lists.opendnssec.org/mailman/listinfo/opendnssec-user