Re: dnssec/obsolete dns keys removal - how to?

2025-06-20 Thread Nick Tait via bind-users
On 21/06/2025 05:16, Florian Piekert via bind-users wrote: Hello, wow, that did the trick. I didn't think of this at all. It -after all- appeared to be VERY obvious. I don't know why I overlooked this possibilty. THANK YOU! Am 20.06.2025 um 19:03 schrieb Crist Clark: Do you have a .signed f

Re: dnssec/obsolete dns keys removal - how to?

2025-06-20 Thread Florian Piekert via bind-users
amed, kill that file, then restart. But removing the file and just doing an rndc reload on the zone may be enough. On Fri, Jun 20, 2025 at 7:20 AM Florian Piekert via bind-users mailto:bind-users@lists.isc.org>> wrote: Dear all, I have tried some faulty ways to setup dnssec for so

dnssec/obsolete dns keys removal - how to?

2025-06-20 Thread Florian Piekert via bind-users
Dear all, I have tried some faulty ways to setup dnssec for some of my domains about a month ago. This resulted in the creation of several ZSK, KSK and CSK dnssec keys (and files) until I got a configuration that actually was working as it should. Due to proper ignorance and non-knowledge I

Re: DNSSEC Validation not working

2025-06-06 Thread Darren Ankney
Hi Luca, This is correct: dnssec-validation auto; If you use "yes" there, then you must supply a trust anchor. Auto is the default. The only idea I have is this: zone "." IN { type hint; file "named.ca"; }; You don't need this anymore. BIND 9.18 wil

DNSSEC Validation not working

2025-06-06 Thread Luca vom Bruch
Hello! I run a server with Bind9.18 on Alma9. It acts as the nameserver for two domains. (with glue records from the registrar). DNSSEC is enabled but somehow outbound queries are not validated? Domains with dnssec do have the "ad" flag though. The local domains somehow dont have t

Re: Cannot import keys into dnssec-policy

2025-04-09 Thread Matthijs Mekking
On 4/9/25 02:29, Bagas Sanjaya wrote: On Tue, Apr 08, 2025 at 07:38:44AM -0500, Matthijs Mekking wrote: This time I was able to reproduce, thanks. The reason why the key created by dnssec-keygen is retired because named thinks it was in use already. When there is key timing metadata, the

Re: Cannot import keys into dnssec-policy

2025-04-09 Thread Bagas Sanjaya
On Tue, Apr 08, 2025 at 07:38:44AM -0500, Matthijs Mekking wrote: > This time I was able to reproduce, thanks. > > The reason why the key created by dnssec-keygen is retired because named > thinks it was in use already. When there is key timing metadata, the key is > considered to

Re: Cannot import keys into dnssec-policy

2025-04-08 Thread Bagas Sanjaya
; On 3/26/25 14:51, Nguyen Thi Minh Tam via bind-users wrote: > > "Hi, I'm trying version 9.18.31. > > > > According to the post on > > https://kb.isc.org/docs/dnssec-key-and-signing-policy > > <https://kb.isc.org/docs/dnssec-key-and-signing-policy>,

Re: Cannot import keys into dnssec-policy

2025-04-08 Thread Matthijs Mekking
This time I was able to reproduce, thanks. The reason why the key created by dnssec-keygen is retired because named thinks it was in use already. When there is key timing metadata, the key is considered to be in use (now or in the past). Only not previously used keys are considered as a

Re: Cannot import keys into dnssec-policy

2025-04-07 Thread Matthijs Mekking
to reproduce the issue. Any logs (preferably debug level 3) would then also be greatly appreciated. Thanks, best regards, Matthijs On 3/26/25 14:51, Nguyen Thi Minh Tam via bind-users wrote: "Hi, I'm trying version 9.18.31. According to the post on https://kb.isc.org/docs/dnss

Cannot import keys into dnssec-policy

2025-03-26 Thread Nguyen Thi Minh Tam via bind-users
"Hi, I'm trying version 9.18.31. According to the post on https://kb.isc.org/docs/dnssec-key-and-signing-policy, the policy normally generates keys when they are needed. However, we can generate the DNSSEC keys ourselves first, and when the policy requires a new key, it will select

Re: [DNSSEC] when remove KSK from file system

2025-03-19 Thread Matthijs Mekking
policy to setup DNSSEC on some zone. When a KSK are "hidden" and present with "rndc dnssec -status ", i moved it to an archive repository. But this generate many logs : mars 19 09:15:46 xxx named[2378461]: 19-Mar-2025 09:15:46.149 dnssec: error: zo

[DNSSEC] when remove KSK from file system

2025-03-19 Thread adrien sipasseuth
Hello, I use Bind 9.20.4, with KASP policy to setup DNSSEC on some zone. When a KSK are "hidden" and present with "rndc dnssec -status ", i moved it to an archive repository. But this generate many logs : mars 19 09:15:46 xxx named[2378461]: 19-Mar-2025 09:15:

RE: Questions about "dnssec validation" statement

2025-03-15 Thread Chris Isaksen
Thanks I'll try that. -Original Message- From: Evan Hunt Sent: Thursday, March 6, 2025 1:46 PM To: Chris Isaksen Cc: bind-users@lists.isc.org Subject: Re: Questions about "dnssec validation" statement On Thu, Mar 06, 2025 at 12:56:08PM +, Chris Isaksen wrote: >

Re: Questions about "dnssec validation" statement

2025-03-11 Thread Evan McKinney
Hi Chris If you've got your global options set similarly to this options { dnssec-validation auto; // Global validation enabled // ... other options ... }; Have you been able to try something along the lines of this? zone "no-dnssec.example" { type forward; forward

Questions about "dnssec validation" statement

2025-03-08 Thread Chris Isaksen
I was wondering if dnssec validation could be set to auto in the options section and then set it to 'no' in a particular zone? We would like to use "dnssec validation auto" but a few forwarding zones we have, we know do not use dnssec and queries fail if it's not se

Re: Questions about "dnssec validation" statement

2025-03-06 Thread Evan Hunt
On Thu, Mar 06, 2025 at 12:56:08PM +, Chris Isaksen wrote: > I was wondering if dnssec validation could be set to auto in the options > section and then set it to 'no' in a particular zone? > > We would like to use "dnssec validation auto" but a few forwarding

RE: Questions about "dnssec validation" statement

2025-03-06 Thread Chris Isaksen
05 AM To: Chris Isaksen Cc: bind-users@lists.isc.org Subject: Re: Questions about "dnssec validation" statement Hi Chris If you've got your global options set similarly to this options { dnssec-validation auto; // Global validation enabled // ... other options ... }; Have

RE: Policy-dnssec timeline step by step

2025-02-25 Thread Nguyen Thi Minh Tam via bind-users
Yes, the ZSK rollover got weird when the DS had not reach omnipresent state yet. Why is that? -Original Message- From: bind-users On Behalf Of Matthijs Mekking Sent: Friday, February 21, 2025 2:30 PM To: bind-users@lists.isc.org Subject: Re: Policy-dnssec timeline step by step Hi

Re: Policy-dnssec timeline step by step

2025-02-20 Thread Matthijs Mekking
Hi, The timings are based on RFC 7583 and "Flexible and Robust Key Rollover in DNSSEC". They may help a great deal in understanding the time states. https://datatracker.ietf.org/doc/html/rfc7583 https://nlnetlabs.nl/downloads/publications/satin2012-Schaeffer.pdf See below for inli

Re: Policy-dnssec timeline step by step

2025-02-20 Thread Ondřej Surý
Have you read: https://kb.isc.org/docs/dnssec-key-and-signing-policy and https://bind9.readthedocs.io/en/latest/dnssec-guide.html This RFC should give you some background too: https://datatracker.ietf.org/doc/html/rfc6781 Ondrej -- Ondřej Surý (He/Him) ond...@isc.org My working hours and

Policy-dnssec timeline step by step

2025-02-20 Thread Nguyen Thi Minh Tam via bind-users
Hi, I'm trying out DNSSEC policy for the first time, and I am so confused about the time states—how they calculate the time for the state of the records to change. I really need help because I have a ton of questions (I'm using BIND 9.18.31, btw). I want to understand how it works st

Re: dnsviz.net: has errors; select the "Denial of existence" DNSSEC option to see them.

2025-02-13 Thread Hans Mayer via bind-users
Hi Taavi, It seems I was blind and didn't see the button. Problem solved. Iterations set to 0 and salt to null. Everything green now at DNSviz. Best regards Hans -- On 07.02.25 17:05, Taavi Eomäe wrote: Hi, If you select the "Denial of existence" under options, then you will see the exac

Re: dnsviz.net: has errors; select the "Denial of existence" DNSSEC option to see them.

2025-02-07 Thread Taavi Eomäe via bind-users
Hi, If you select the "Denial of existence" under options, then you will see the exact details behind those errors. It seems like your NSEC3 iterations count is not 0, but it should be 0 to alleviate computational burdens. See RFC9276, Sec. 3.1. Best regards Taavi smime.p7s Description:

dnsviz.net: has errors; select the "Denial of existence" DNSSEC option to see them.

2025-02-07 Thread Hans Mayer via bind-users
dnsviz: ok7gd.aw5sp.iiasa.ac.at/A has errors; select the "Denial of existence" DNSSEC option to see them. Searching for solutions didn't really help. Any idea how to solve this issue ? Or where to dig deeper to find a solution ? Kind regards Hans -- -- Visit https://lists.

Re: Problems with the Deletion of Retired Keys in DNSSEC

2024-11-08 Thread Matthijs Mekking
happening automatically because I used |dnssec-policy|. If it’s not happening, is there something else that can help me automate this process by withdrawing the key ? On Fri, Nov 8, 2024 at 12:58 AM Crist Clark <mailto:cjc%2bbind-us...@pumpky.net>> wrote: You need to tell BIND the

Re: Problems with the Deletion of Retired Keys in DNSSEC

2024-11-08 Thread Τάσος Λολότσης
Hello Thank you very much for the reply. I thought this was happening automatically because I used dnssec-policy. If it’s not happening, is there something else that can help me automate this process by withdrawing the key ? On Fri, Nov 8, 2024 at 12:58 AM Crist Clark wrote: > You need to t

Re: Problems with the Deletion of Retired Keys in DNSSEC

2024-11-07 Thread Crist Clark
You need to tell BIND the DS is gone from the parent. See the usage for, rndc dnssec -checkds withdrawn On Thu, Nov 7, 2024 at 12:04 PM Τάσος Λολότσης wrote: > Hello all, > > I’m currently facing an issue with DNSSEC key management in BIND and > would appreciate any insights or

Problems with the Deletion of Retired Keys in DNSSEC

2024-11-07 Thread Τάσος Λολότσης
Hello all, I’m currently facing an issue with DNSSEC key management in BIND and would appreciate any insights or experiences you might have. I have configured a DNSSEC policy for my domain with the following settings: keys { csk key-directory lifetime P365D algorithm ecdsa256; }; // Key

Re: DNSSEC, OpenDNS and www.cdc.gov - DNS Compliance checker?

2024-11-05 Thread Joseph Zik
DNS... > > Thanks in advance for any thoughts you can provide. > > Robert Wagner > From: bind-users on behalf of Robert > Edmonds > Sent: Friday, November 1, 2024 4:16 PM > To: Robert Mankowski > Cc: bind-users@lists.isc.org > Subject: Re: DNSSEC, OpenDNS and w

Re: DNSSEC, OpenDNS and www.cdc.gov - DNS Compliance checker?

2024-11-04 Thread Julian Panke via bind-users
for proper configuration. Kind of a SSL checker for DNS... Thanks in advance for any thoughts you can provide. Robert Wagner From: bind-users on behalf of Robert Edmonds Sent: Friday, November 1, 2024 4:16 PM To: Robert Mankowski Cc: bind-users@lists.isc.org Subject: Re: DNSSEC, OpenDNS and

Re: DNSSEC, OpenDNS and www.cdc.gov - DNS Compliance checker?

2024-11-04 Thread Robert Wagner
From: bind-users on behalf of Robert Edmonds Sent: Friday, November 1, 2024 4:16 PM To: Robert Mankowski Cc: bind-users@lists.isc.org Subject: Re: DNSSEC, OpenDNS and www.cdc.gov This email originated from outside of TESLA Do not click links or open attachments unless you recognize

Re: DNSSEC, OpenDNS and www.cdc.gov

2024-11-01 Thread Robert Edmonds
e have been reported to DNS-OARC's dns-operations mailing list over the years (as well as other forums). The most recent thread is archived here: https://lists.dns-oarc.net/pipermail/dns-operations/2024-July/022642.html Robert Mankowski wrote: > I recently implemented a forward only BIND ser

Re: Question about DNSSEC

2024-11-01 Thread Bob McDonald
+mtrace to see each individual message. > -Evan > > Get BlueMail <https://bluemail.me> for Desktop > > Ondřej Surý wrote: > > > DO flag is indication to “do DNSSEC”, it has no other meaning. You should > be looking for AD flag. > > As for delv output - it prin

Re: Question about DNSSEC

2024-11-01 Thread Bob McDonald
Sorry, I get the DO and AD flags confused. I see now that DIG is telling me that somewhere in the chain there is an entry that is not validated. I was doing everything manually. And yes, I saw that DELV runs the chain. Thanks again, Bob -- Visit https://lists.isc.org/mailman/listinfo/bind-user

Re: Question about DNSSEC

2024-11-01 Thread Evan McKinney
Even with a CNAME record, the delv command will validate each step of the resolution. You can use the +vtrace option to see each validation and +mtrace to see each individual message. -Evan Get BlueMail <https://bluemail.me> for Desktop Ondřej Surý wrote: DO flag is indication to “do DNSSE

Re: Question about DNSSEC

2024-11-01 Thread Ondřej Surý
DO flag is indication to “do DNSSEC”, it has no other meaning. You should be looking for AD flag.As for delv output - it prints out which names are validated and those that are not. I don’t see anything wrong here.--Ondřej Surý — ISC (He/Him)My working hours and your working hours may be different

Re: Question about DNSSEC

2024-11-01 Thread Bob McDonald
main apex CNAMEs...) Here's the DIG and DELV output (recursive server is running bind 9.20.2 on a raspberrypi under freeBSD 14.1-p6): root@RaspberryPI-00:~ # dig www.irs.gov. +dnssec ; <<>> DiG 9.20.2 <<>> www.irs.gov. +dnssec ;; global options: +cmd ;; Got answer: ;

Re: Question about DNSSEC

2024-10-31 Thread G.W. Haywood
Hi there, On Thu, 31 Oct 2024, Crist Clark wrote: Name names. DNS is out there in public. There are a LOT of US .gov sites where the .gov is all signed, but it ends up in $BIGCLOUDPROVIDER that is not. www.gsa.gov www.state.gov www.house.gov www.senate.gov www.cia.gov www.cisa.gov (*ehem*) ww

Re: Question about DNSSEC

2024-10-31 Thread Crist Clark
a lot of .mil. On Thu, Oct 31, 2024 at 3:34 PM Mark Andrews wrote: > > > > On 1 Nov 2024, at 09:15, Bob McDonald wrote: > > > > If a host is defined as a CNAME chain where the domain of the host is > DNSSEC signed but the domain(S) of the target(s) in the CNAME chai

Re: Question about DNSSEC

2024-10-31 Thread Mark Andrews
> On 1 Nov 2024, at 09:15, Bob McDonald wrote: > > If a host is defined as a CNAME chain where the domain of the host is DNSSEC > signed but the domain(S) of the target(s) in the CNAME chain are not, does > that mean that the entry really isn't DNSSEC protected? Correc

Question about DNSSEC

2024-10-31 Thread Bob McDonald
If a host is defined as a CNAME chain where the domain of the host is DNSSEC signed but the domain(S) of the target(s) in the CNAME chain are not, does that mean that the entry really isn't DNSSEC protected? I can list an example dig for the host in question but I'm reluctant to do so

Re: DNSSEC with views and shared zone files

2024-10-22 Thread Bowie Bailey via bind-users
second issue is that I have multiple zones that all point to the same file since those domains all go to the same set of servers. Right now, I am using the same zone file for all of them. This works fine currently, but when I try to enable DNSSEC for those domains, I get an

Re: DNSSEC with views and shared zone files

2024-10-21 Thread Bowie Bailey via bind-users
same file since those domains all go to the same set of servers. Right now, I am using the same zone file for all of them. This works fine currently, but when I try to enable DNSSEC for those domains, I get an error "writable file ... already in use".  The simple answer

Re: DNSSEC with views and shared zone files

2024-10-19 Thread Michael Richardson
Bowie Bailey via bind-users wrote: > The first issue is that my server uses a few views to give different IPs > based on which network the request comes from.  I found that if I point the > zones in the different views to the same key directory, there are no errors > and all vie

Re: DNSSEC with views and shared zone files

2024-10-18 Thread Ondřej Surý
obligated to reply outside your normal working hours. > On 18. 10. 2024, at 19:50, Bowie Bailey via bind-users > wrote: > > I would like to have DNSSEC active on both domains, but since they are > sharing a file, Bind complains about it. -- Visit https://lists.isc.org/mailman/listinf

Re: DNSSEC with views and shared zone files

2024-10-18 Thread Nick Tait via bind-users
On 19/10/2024 05:50, Bowie Bailey via bind-users wrote: On 10/18/2024 12:07 PM, Bob Harold wrote: On Fri, Oct 18, 2024 at 11:33 AM Bowie Bailey via bind-users wrote: I am finally getting around to setting up DNSSEC on my server (Bind 9.16).  I found some instructions online and was

Re: DNSSEC with views and shared zone files

2024-10-18 Thread Sten Carlsen
isc.org>> wrote: >> I am finally getting around to setting up DNSSEC on my server (Bind >> 9.16). I found some instructions online and was able to set up one of >> my zones and confirm that the keys are being returned. However, after >> doing a bit more testing I r

Re: DNSSEC with views and shared zone files

2024-10-18 Thread Sten Carlsen
ie Bailey via bind-users >> mailto:bind-users@lists.isc.org>> wrote: >>> I am finally getting around to setting up DNSSEC on my server (Bind >>> 9.16). I found some instructions online and was able to set up one of >>> my zones and confirm that the keys are being retur

Re: DNSSEC with views and shared zone files

2024-10-18 Thread Bowie Bailey via bind-users
On 10/18/2024 12:07 PM, Bob Harold wrote: On Fri, Oct 18, 2024 at 11:33 AM Bowie Bailey via bind-users wrote: I am finally getting around to setting up DNSSEC on my server (Bind 9.16).  I found some instructions online and was able to set up one of my zones and confirm that

Re: DNSSEC with views and shared zone files

2024-10-18 Thread Bob Harold
On Fri, Oct 18, 2024 at 11:33 AM Bowie Bailey via bind-users < bind-users@lists.isc.org> wrote: > I am finally getting around to setting up DNSSEC on my server (Bind > 9.16). I found some instructions online and was able to set up one of > my zones and confirm that the keys are

DNSSEC with views and shared zone files

2024-10-18 Thread Bowie Bailey via bind-users
I am finally getting around to setting up DNSSEC on my server (Bind 9.16).  I found some instructions online and was able to set up one of my zones and confirm that the keys are being returned.  However, after doing a bit more testing I ran into a couple of issues. I am using the recommended

RE: DNSSEC, OpenDNS and www.cdc.gov

2024-10-16 Thread Robert Mankowski
Thanks Greg. That is very helpful. Sorry I didn't find that article on my own. Bob From: Greg Choules Sent: Wednesday, October 16, 2024 10:10 AM To: Robert Mankowski Cc: bind-users@lists.isc.org Subject: Re: DNSSEC, OpenDNS and www.cdc.gov Hi Bob. See if this article helps any first, b

Re: DNSSEC, OpenDNS and www.cdc.gov

2024-10-16 Thread Greg Choules
> to OpenDNS FamilyShield using TLS and DNSSEC at first, but I was getting a > noticeable amount of SERVFAIL responses. I believe it is related to DNSSEC > (see delv tests below), but I don’t believe it is my configuration because > when I forward to Cloudflare’s Family service, or to

DNSSEC, OpenDNS and www.cdc.gov

2024-10-16 Thread Robert Mankowski
I recently implemented a forward only BIND server for home. I was forwarding to OpenDNS FamilyShield using TLS and DNSSEC at first, but I was getting a noticeable amount of SERVFAIL responses. I believe it is related to DNSSEC (see delv tests below), but I don't believe it is my configur

Re: DNSSEC algo rollover fails to delete old keys

2024-10-16 Thread Robert Wagner
dy yet, then please keep these standards in mind for future direction when available. RW From: bind-users on behalf of Matthijs Mekking Sent: Wednesday, October 16, 2024 4:03 AM To: bind-users@lists.isc.org Subject: Re: DNSSEC algo rollover fails to delete ol

Re: DNSSEC algo rollover fails to delete old keys

2024-10-16 Thread Matthijs Mekking
If you provide the output of `rndc dnssec -status` it might give a hint why the keys are still published. I suspect that BIND needs to be told that the DS has been withdrawn for the parent zone (assuming you don't have parental-agents set up). For future algorithm rollovers: You can

Re: DNSSEC algo rollover fails to delete old keys

2024-10-15 Thread Mark Andrews
Restore the keys from backups and let named MANAGE the removal of the old keys. People really need to stop being impatient with DNSSEC key management. It is a SLOW process as there are interactions with the parent zone that need to be co-ordinated and WAIT TIMES that need to be observed. Named

DNSSEC algo rollover fails to delete old keys

2024-10-15 Thread Arnold DECHAMPS
Hello everyone, I made a algo rollover in DNSSEC from algo 8 to algo 13. Software version : 9.18.28-1~deb12u2-Debian My zone configuration refers to policies : == dnssec-policy "algo8" { keys { ks

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-10-02 Thread Petr Špaček
On 01. 10. 24 8:15, Terik Erik Ashfolk wrote: Please scratch the below line previous post. Upon detail look, they have Multi-Master support, but not with DNSSEC support. If you really wanted multi-master with DNSSEC you can have a look at FreeIPA.org, their DNS integration has that. It

AW: AW: Specifying NSEC3 salt with dnssec-policy

2024-10-01 Thread Klaus Darilion via bind-users
> > I always had the impression that dnssec-signzone is a stand-alone > > utility and signing is done either with dnssec-signzone or with > > Bind's dnssec-policy. Does it really work to use dnssec-signzone on a > > zone and journal that is managed by named? > >

AW: Specifying NSEC3 salt with dnssec-policy

2024-10-01 Thread Klaus Darilion via bind-users
Hi Matthijs! I always had the impression that dnssec-signzone is a stand-alone utility and signing is done either with dnssec-signzone or with Bind's dnssec-policy. Does it really work to use dnssec-signzone on a zone and journal that is managed by named? Regards Klaus -- Klaus Dar

Re: AW: AW: Specifying NSEC3 salt with dnssec-policy

2024-10-01 Thread Petr Špaček
On 01. 10. 24 14:45, Klaus Darilion via bind-users wrote: I always had the impression that dnssec-signzone is a stand-alone utility and signing is done either with dnssec-signzone or with Bind's dnssec-policy. Does it really work to use dnssec-signzone on a zone and journal that is manag

AW: AW: AW: Specifying NSEC3 salt with dnssec-policy

2024-10-01 Thread Klaus Darilion via bind-users
only in testing. So I am fine with the workaround of doing manual signing with dnssec-signzone. Regards Klaus PS: All of nic.at/RcodeZero is using RFC 9276. -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this

Re: AW: Specifying NSEC3 salt with dnssec-policy

2024-10-01 Thread Matthijs Mekking
On 10/1/24 09:44, Klaus Darilion wrote: Hi Matthijs! I always had the impression that dnssec-signzone is a stand-alone utility and signing is done either with dnssec-signzone or with Bind's dnssec-policy. Does it really work to use dnssec-signzone on a zone and journal that is manag

Re: AW: AW: AW: Specifying NSEC3 salt with dnssec-policy

2024-10-01 Thread Petr Špaček
On 01. 10. 24 15:41, Klaus Darilion wrote: Hi Petr! It can be said that the interface pushes people to follow RFC 9276, i.e. no salt and no extra iterations. It is an pointless exercise which only makes servers easier to DoS for no benefit. I understand your decision to push people towards R

Re: Specifying NSEC3 salt with dnssec-policy

2024-09-30 Thread Matthijs Mekking
Hi Klaus, With dnssec-policy you can specify the salt length, not a specific salt. You can still use dnssec-signzone -3 to manually set a salt. Best regards, Matthijs On 9/30/24 22:38, Klaus Darilion via bind-users wrote: Hello! With "auto-dnssec maintain;" I was used to specify

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-30 Thread Terik Erik Ashfolk
Please scratch the below line previous post. Upon detail look, they have Multi-Master support, but not with DNSSEC support. On 9/30/24 4:00 PM, Terik Erik Ashfolk wrote: I think i've seen another project Seen few other project also doing similar -- Visit https://lists.isc.org/ma

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-30 Thread Terik Erik Ashfolk
Hi Mark. THANK YOU. sorry for delayed response. I understood some of your response better after Matthijs also mentioned your mail-post. I need to look into DNSSEC activity flow again, i'm sure there are changes since my last works on these, 5 years back. Main domain is "e

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-30 Thread Terik Erik Ashfolk
r I regret, i did not follow all the links in your ref in your ISC pdf, which appeared in ggl search result earlier, & i assumed by-now BIND has builtin Multi-Signer MODEL-2 aka Multi-Master/Primary DNSSEC mode support. If the "MUSIC" was in C / C++ / perl, etc that would hav

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-30 Thread Terik Erik Ashfolk
service-from their own-home/homeoffice/mobile devices (so routing, fast-updating, etc are involved), and/or link their own server from server-providers. Those were main reasons to have (very) low TTL, for faster update, And i used that (faster-update) opportunity to also update/change DNSSEC

Specifying NSEC3 salt with dnssec-policy

2024-09-30 Thread Klaus Darilion via bind-users
Hello! With "auto-dnssec maintain;" I was used to specify the NSEC3 salt with 'rndc signing -nsec3param'. Today I used the "dnssec-policy" and I failed to specify the salt manually. Are there any tricks/workarounds to manually specify the NSEC3 salt? I know th

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-30 Thread Matthew Pounsett
On Sat, Sep 28, 2024 at 11:13 AM Terik Erik Ashfolk wrote: > > But 1024 or 2048 bit RSA key-pairs are considered weak. > Those are considered weak for _encryption_ because of the risk of future decryption of secrets. The window for someone to brute force your keys and fake signatures with a lim

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-29 Thread Matthijs Mekking
Hi Erik, There is no configuration option for enabling multi-signer in BIND. BIND 9.20 is able to deal with multi-signer setups, but as Mark mentioned earlier, all the coordination needs to be done outside the name server. You may consider MUSIC for this: https://github.com/DNSSEC

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-28 Thread Terik Erik Ashfolk
dden/offline). My project require DNSSEC validated connections+links for user's homepage and devices, etc. Some components are open-source, & some are partially closed & available over API. I could not continuously work on this project. ( i can DM you more specifics , but no

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-27 Thread Ondřej Surý
> On 28. 9. 2024, at 1:31, Terik Erik Ashfolk wrote: > > and during consideration i was using a dnssec-policy opPolicy2W with KSK > changing every 20 days, & ZSK every 10 days. > > Now I changed to another dnssec-policy opPolicy3M : KSK changing every ~ 3 > months &

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-27 Thread Terik Erik Ashfolk
1/08/25/multi-signer-dnssec-models/ in MODEL 2. I added an improved image as attachment. MULTI-ZSK-SIGNING IS ONE OF THE SOLUTION, and appears to be suitable for my case. So, multi-signing with ZSKs from multiple nameservers would have worked, when nameservers were using separate "zones"

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-27 Thread Terik Erik Ashfolk
Hi Ondrej. THANK YOU. I understand what you have suggested. I considered that earlier : it would've increased 1 more server rent cost, and additional setup, maintenance/update, etc times, ... and during consideration i was using a dnssec-policy opPolicy2W with KSK changing every 20 days,

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-27 Thread Mark Andrews
records. All this needs to go through the IETF. -- Mark Andrews > On 28 Sep 2024, at 07:54, Terik Erik Ashfolk wrote: > > According to the page > https://blog.apnic.net/2021/08/25/multi-signer-dnssec-models/ > in MODEL 2. > I added an improved image as attachment. > > MUL

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-27 Thread Terik Erik Ashfolk
According to the page https://blog.apnic.net/2021/08/25/multi-signer-dnssec-models/ in MODEL 2. I added an improved image as attachment. MULTI-ZSK-SIGNING IS ONE OF THE SOLUTION, and appears to be suitable for my case. So, multi-signing with ZSKs from multiple nameservers would have worked

Re: Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-26 Thread Ondřej Surý
Hi Erik, whatever you did below is complicated, unnecessary, and prone to break. Just create one hidden primary that will do the signing and two to three public secondaries that are independent of each other. Then setup DNSSEC in a way that it’s ok for the primary to be down for a specified

Multi Master/Primary Authoritative DNSSEC DNS Nameserver With Synced/Replicated COMMON Dir/Vol For BIND

2024-09-26 Thread TErik Ashfolk
Hello BIND Community. Looking forward to your suggestions, advises on setup DNSSEC enabled zones on multiple master/primary authoritative DNS server (Nameserver) with synced/replicated common shared directories/volume. Please skip the section(s) that you dont need to read/scan, & goto

named -C, ...: Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-07 Thread Michael Paoli via bind-users
r Špaček wrote: > > Hello, > > and thank you for reaching out. I agree this was poorly documented. > > In recent versions you can use command `named -C` which prints out > default configuration, including the default DNSSEC policy. > > I'm going to update document

Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-07 Thread Petr Špaček
Hello, and thank you for reaching out. I agree this was poorly documented. In recent versions you can use command `named -C` which prints out default configuration, including the default DNSSEC policy. I'm going to update documentation to reflect that: https://gitlab.isc.org/isc-pro

Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-06 Thread Mark Andrews
macro system.) > > First, the official definitions are at IANA: > https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml > https://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml > > Second, in working with BIND and DNSSEC over the years, it is

Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-06 Thread Michael Paoli via bind-users
Ah, thanks! Yeah, that's what I was looking to find: https://github.com/isc-projects/bind9/blob/main/doc/misc/dnssec-policy.default.conf https://gitlab.isc.org/isc-projects/bind9/-/blob/main/doc/misc/dnssec-policy.default.conf Alas, not in the ISC distribution tarballs, and the document

Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-06 Thread Al
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml https://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml Second, in working with BIND and DNSSEC over the years, it is not my impression that BIND restricts the algorithm number in any way. I don't think it even knows w

Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-06 Thread Andrew Latham
Link for the Debian packaged version you mentioned is at https://bind9.readthedocs.io/en/v9.18.24/reference.html#namedconf-statement-dnssec-policy On Thu, Jun 6, 2024 at 9:31 AM Andrew Latham wrote: > I took a quick look > > * > https://github.com/isc-projects/bind9/blob/main/doc

Re: dnssec-policy default - where/how to determine what all its settings are?

2024-06-06 Thread Andrew Latham
I took a quick look * https://github.com/isc-projects/bind9/blob/main/doc/misc/dnssec-policy.default.conf * https://gitlab.isc.org/isc-projects/bind9/-/blob/main/doc/misc/dnssec-policy.default.conf On Thu, Jun 6, 2024 at 8:19 AM Michael Paoli via bind-users < bind-users@lists.isc.org>

dnssec-policy default - where/how to determine what all its settings are?

2024-06-06 Thread Michael Paoli via bind-users
dnssec-policy default - where/how to determine what all its settings are? Documentation doc/bind9-doc/arm/reference.html#dnssec-policy-default https://bind9.readthedocs.io/en/v9.18.27/reference.html#dnssec-policy-default says: A verbose copy of this policy may be found in the source tree, in the

Re: [DNSSEC] testing KASP

2024-05-29 Thread Petr Špaček
SState: hidden"         If not in my registar (dig ds +dnssec +multiline)             Publish on my Registar(api register)             Notify Bind(bind rndc dnssec -checkds -key published )             Notify Bind(bind rndc dnssec -checkds -key withdraw ) In my understanding, i sho

Re: [DNSSEC] testing KASP

2024-05-29 Thread adrien sipasseuth
w the old DS? Yes, the old DS should be not yet withdraw because some RRSIG could be still valid ? or can i withdraw the old DS / KSK immediatly ? In my logic : For each file en .state If is KSK with "DSState: rumoured" or "DSState: hidden" If not in my regi

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Greg Choules
sers@lists.isc.org > <mailto:bind-users@lists.isc.org> <mailto:bind-users@lists.isc.org>> > Subject: Re: Make dig and nslookup DNSSEC aware? > > This email originated from outside of TESLA > > Do not click links or open attachments unless you recognize the sender

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Robert Wagner
-users@lists.isc.org Subject: Re: Make dig and nslookup DNSSEC aware? This email originated from outside of TESLA Do not click links or open attachments unless you recognize the sender and know the content is safe. > Doesn't dig already offer DoT using +tls and DoH using +https? You

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Havard Eidnes via bind-users
> Doesn't dig already offer DoT using +tls and DoH using +https? You're right, it does. I need to sort out my $PATH... Regards, - Håvard -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support sub

RE: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Friesen, Don CITZ:EX via bind-users
Doesn't dig already offer DoT using +tls and DoH using +https ? Don Friesen -Original Message- From: bind-users On Behalf Of Ondrej Surý Sent: Wednesday, May 22, 2024 8:09 AM To: Havard Eidnes Cc: bind-users@lists.isc.org Subject: Re: Make dig and nslookup DNSSEC aware? [EXT

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread David Farje
forget about nslookup. deprecated in my mind. use dig like so: for DoT: $dig @1.1.1.1 -tA +dnssec +tls www.google.com for Doh: dig @1.1.1.1 -ta +https +dnssec www.google.com Make sure you have a more recent version of dig to supports this. If you need programmatic DNSSEC access use a library

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Ondřej Surý
> On 22. 5. 2024, at 17:02, Havard Eidnes via bind-users > wrote: > > And, no, I'm not aware of any such plans to incorporate a DNSSEC > validator in any of those tools. Not sure it makes technical > sense, as it's a fairly large task. That's what a validating

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Havard Eidnes via bind-users
>> Sorry if this has already been hashed through, but I cannot >> find anything in the archive. Is there any chance someone can >> make dig and nslookup DNSSEC aware and force it to use DoT or >> DoH ports - TCP 443 or 853 only? > > Not sure about that. However, the

Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Havard Eidnes via bind-users
> Sorry if this has already been hashed through, but I cannot > find anything in the archive. Is there any chance someone can > make dig and nslookup DNSSEC aware and force it to use DoT or > DoH ports - TCP 443 or 853 only? Not sure about that. However, the "kdig" utilit

  1   2   3   4   5   6   7   8   9   10   >