Re: dnssec-signzone

2020-04-06 Thread Tony Finch
ning, and I wrote it 9 years ago (!) around the time of 9.8.0 to make it easier to update signed zones. It's easier than dnssec-signzone. https://fanf.livejournal.com/112476.html http://dotat.at/prog/nsdiff/ Tony. -- f.anthony.n.finchhttp://dotat.at/ work to th

[Fwd: dnssec-signzone]

2020-04-06 Thread David Alexandre M. de Carvalho
Hi again. So finally i was able to sign my zone thanks to a different (older) tutorial. I specified dnssec-signzone with flags -o and -S and it worked! If anyone could please answer these questions, I would appreciate it 1) do I need to generate those 2 .key and .private files if I intend to sign

dnssec-signzone

2020-04-06 Thread David Alexandre M. de Carvalho
Hi all. So I'm still fighting with dnssec in BIND 9.8.2 (oracle linux 6). Unfortunately no automatic sigining before Bind 9.9, from what I read. I can't sign my zone, I keep getting "dnssec-signzone: fatal: No signing keys specified or found." By now I've tried to move

Re: dnssec-signzone sometimes does lowercase DNSSEC records

2018-07-26 Thread Mark Andrews
> On 27 Jul 2018, at 1:34 am, Daniel Stirnimann > wrote: > > Hello all, > > dnssec-signzone (BIND 9.12.2) sometimes does lowercase DNSSEC records. > This seems a problem especially for NSEC records which are case > sensitive. dnssec-verify is moaning with errors lik

dnssec-signzone sometimes does lowercase DNSSEC records

2018-07-26 Thread Daniel Stirnimann
Hello all, dnssec-signzone (BIND 9.12.2) sometimes does lowercase DNSSEC records. This seems a problem especially for NSEC records which are case sensitive. dnssec-verify is moaning with errors like this: Bad NSEC record for ipad-rigi-2.switch.ch, bit map mismatch Example: dnssec-signzone -o

Re: dnssec-signzone retains obsolete signatures

2016-04-02 Thread Daniel Stirnimann
> While this is not a problem for BIND to load the zone it seems > unexpected to me. Should dnssec-signzone not remove obsolete signatures? Found out that this issue is fixed in BIND 9.11.0a1: 4305. [bug]dnssec-signzone was not removing unnecessary rrsigs from the zone&

dnssec-signzone retains obsolete signatures

2016-03-22 Thread Daniel Stirnimann
Dear all, I have the following test zone files: 8.example.com.signed K8.example.com.+008+40162.key K8.example.com.+008+40162.private I edit the signed zone directly (8.example.com.signed) and remove for example an A record and then resign the zone as following: dnssec-signzone -z -o 8

Re: dnssec-signzone SMIMEA/TYPE65280 RR

2014-10-31 Thread Evan Hunt
On Tue, Oct 28, 2014 at 04:48:20AM +1100, shm...@riseup.net wrote: > i couldn't sign a zone with the draft SMIMEA RR from debian jessie based OS It's not yet been implemented in BIND. I expect we will, but not until it's at least been allocated a type code (see http://www.iana.org/assignments/dns

dnssec-signzone SMIMEA/TYPE65280 RR

2014-10-31 Thread shm...@riseup.net
ption +++-=-=-=-=== ii bind9utils1:9.8.4.dfsg.P1-6+nmu amd64 Utilities for BIND dnssec-signzone: warning: example.net:40: unknown RR type 'SMIMEA' dnssec-signzone: fatal: failed loading zone from 'example.net': unknown class

proposed new command line option for dnssec-signzone

2013-09-18 Thread Pierre Beyssac
Hello all, I have written a small patch for dnssec-signzone to handle what I assume is a pretty common case for big zones: ZSK rollover without double RRSIGs, ie removal of the RRSIG records signed with the old ZSK (inactive but still published while waiting for cache expiration of the old RRSIGs

Re: dnssec-signzone: warning: NSEC3 generation requested with no DNSKEY; ignoring

2013-04-26 Thread Paul B. Henson
On 4/25/2013 11:57 AM, Evan Hunt wrote: The warning is spurious and has been fixed in 9.9.3. It was incorrectly checking to see whether there were any DNSKEY records in the zone *before* loading them from the key files. It should have been doing so afterward, obviously. Ah, okay, thanks for

Re: dnssec-signzone: warning: NSEC3 generation requested with no DNSKEY; ignoring

2013-04-25 Thread Evan Hunt
> dnssec-signzone -d /path/to/dsset -K /path/to/keys -3 00 -f > zone.signed -e +3024000 -j 1800 -o zone.edu -r /dev/urandom -S -T 12h > /path/to/input > > dnssec-signzone: warning: NSEC3 generation requested with no DNSKEY; > ignoring > Fetching ZSK 59544/RSASHA25

dnssec-signzone: warning: NSEC3 generation requested with no DNSKEY; ignoring

2013-04-25 Thread Paul B. Henson
We're upgrading from bind 9.8 to 9.9, and there's a new warning from dnssec-signzone that's confusing me. We are using a locally developed mechanism for signing that predates the auto and in-line signing mechanisms currently available in bind, and run the command like this: dns

Re: dnssec-signzone ignoring "-x" option?

2012-09-18 Thread Paul Wouters
On Mon, 17 Sep 2012, Evan Hunt wrote: Does anyone use dnssec-signzone with -x? If so, can you check/tell me your DNSKEY RRset? I just tested it with "dnssec-signzone -Sx example.com" and "dnssec-signzone -x example.com", on 9.9.2 and 9.7.4, and it worked as expected in

Re: dnssec-signzone ignoring "-x" option?

2012-09-17 Thread Evan Hunt
> Does anyone use dnssec-signzone with -x? If so, can you check/tell me > your DNSKEY RRset? And if it works, could you reveal the full > commandline argument used, the bind version, and whether any pkcs#11 > provider was compiled in? I just tested it with "dnssec-signzone -Sx

dnssec-signzone ignoring "-x" option?

2012-09-17 Thread Paul Wouters
was looking at using the "-x" option with dnssec-signzone, but it seems that at least for my commandline invocation, that this option is completely ignored. The version used is 9.7.4. Does anyone use dnssec-signzone with -x? If so, can you check/tell me your DNSKEY RRset? And if it wo

Re: dnssec-signzone, dsset files and deleted KSK's

2012-08-03 Thread John Marshall
tory. > > I have upgraded to BIND 9.9.1-P2 and see the same behaviour there as > well. Unless I am missing something obvious, it seems that the only way > to avoid having "dnssec-signzone -g" for a parent zone pick up stale DS > records from dsset files generated by "d

Re: dnssec-signzone, dsset files and deleted KSK's

2012-08-03 Thread John Marshall
re as well. Unless I am missing something obvious, it seems that the only way to avoid having "dnssec-signzone -g" for a parent zone pick up stale DS records from dsset files generated by "dnssec-signzone -S" for the child zones is to remove deleted KSK's from the (-K) key reposito

dnssec-signzone, dsset files and deleted KSK's

2012-08-02 Thread John Marshall
Context: BIND 9.8.3-P2 If dnssec-signzone is invoked with -S (smart signing), it examines keys in the key repository directory (-K) and selects only current keys for inclusion in the zone. That works well. It also generates DS records for the parent zone and lands them in a dsset file in (-d

Possible dnssec-signzone re-sign bug with former orphan glue

2012-07-16 Thread Paul Wouters
Hi, When using dnssec-signzone manually to sign a zone, I think there is a case where it does not drop the RRSIGs when I think it should. Image that dnssec-signzone is used with the old signed zone's RRSIG/NSEC* data, along with an updated "unsigned" zone. Let's say we are

Re: dnssec-signzone and jitter bug... still

2011-11-01 Thread Paul Wouters
On Tue, 1 Nov 2011, Paul Wouters wrote: There have been discussions in the past over this, but we were once again bitten by this dnssec-signzone bug: Tue Nov 1 12:11:28 2011 signDomain: sign command: /usr/sbin/dnssec-signzone -C -u -r /dev/random -t -o openswan.org -f /var/tmp

Re: dnssec-signzone and jitter bug... still

2011-11-01 Thread Paul Wouters
On Tue, 1 Nov 2011, Paul Wouters wrote: There have been discussions in the past over this, but we were once again bitten by this dnssec-signzone bug: Tue Nov 1 12:11:28 2011 signDomain: sign command: /usr/sbin/dnssec-signzone -C -u -r /dev/random -t -o openswan.org -f /var/tmp

dnssec-signzone and jitter bug... still

2011-11-01 Thread Paul Wouters
There have been discussions in the past over this, but we were once again bitten by this dnssec-signzone bug: Tue Nov 1 12:11:28 2011 signDomain: sign command: /usr/sbin/dnssec-signzone -C -u -r /dev/random -t -o openswan.org -f /var/tmp/openswan.org.sign.tmp -i 1296000 -e +2592000 -j

dnssec-signzone: fatal: cannot sign zone with non-private dnskey

2011-03-22 Thread Ivo
Hello, I am trying to sign a zone(domain.nx) using Bind-9.7.3 with PCKS11/OpenSC, I am able to generate key on smartcard using (pkcs11-keygen) and export a meta-description info with dnssec-keyfromlabel, however dnssec-signzone seem to have problem finding a private key. #./dnssec-signzone -E

Re: Some dnssec-signzone questions

2011-02-01 Thread Torinthiel
; two-digit of daily version. This has benefit of being almost as good as >> putting unixtime of last modification, while being much more >> human-readable. >> How difficult would it be to implement this for dnssec-signzone -N, >> using a >> fourth format specifie

Re: Some dnssec-signzone questions

2011-02-01 Thread Torinthiel
> signatures, thus saving on computation time (not that I have a lot to >> save >> on ;). So, I'd like dnssec-signzone to take 'normal' records from >> non-signed >> zone, try to reuse RRSIG records as much as possible, taking them from >> signed zone, and w

Re: Some dnssec-signzone questions

2011-02-01 Thread Jay Ford
xtime of last modification, while being much more human-readable. How difficult would it be to implement this for dnssec-signzone -N, using a fourth format specifier? It's not hard. See my bind-users post of Oct 15 with subject: more flexible serial number handling in dnssec-signzone

Re: Some dnssec-signzone questions

2011-02-01 Thread Paul Wouters
e readable, and can contain $INCLUDE directives, which makes modification easier. But specifying the signed zone has added benefit of reusing existing signatures, thus saving on computation time (not that I have a lot to save on ;). So, I'd like dnssec-signzone to take 'normal' records

Some dnssec-signzone questions

2011-02-01 Thread Torinthiel
I have three questions regarding dnssec-signzone: To clarify things, I'm using BIND 9.7.2-P2. First is about input file: you can specify on the command line either the signed version of the zone, or the unsigned one. What I'd like to do hovever, is to use both. The unsigned zone is

Re: Strange behaviour of dnssec-signzone

2010-12-15 Thread Patrick Vande Walle
On Wed, 15 Dec 2010 22:22:45 +1100, Mark Andrews wrote: > A string in a TXT record can only be 255 characters long though there > can be multiple strings. If you try to load a string longer than 255 > characters you will get the error above. Thanks Mark. This was indeed the case. The DKIM TX

Re: Strange behaviour of dnssec-signzone

2010-12-15 Thread Mark Andrews
In message , Patrick Vande Walle writes : > Greetings, > > My zone file contains a TXT record for DKIM : > > sig-2010._domainkey IN TXT "v=DKIM1; r=postmaster; g=*; k=rsa; > t=s; p=[deleted for shortness]" > > When I run: /usr/sbin/dnssec-

Strange behaviour of dnssec-signzone

2010-12-15 Thread Patrick Vande Walle
Greetings, My zone file contains a TXT record for DKIM : sig-2010._domainkey IN TXT "v=DKIM1; r=postmaster; g=*; k=rsa; t=s; p=[deleted for shortness]" When I run: /usr/sbin/dnssec-signzone -u -3 5D2CA8 -C -g -p -o example.net. -e +7776000 -l dlv.isc.org zone.db K*.private

Re: more flexible serial number handling in dnssec-signzone

2010-10-15 Thread Niobos
ne direction only, forward... so using date/time > makes sure you are always incrementing the serial. And you even don't > need to know the current serial to update it. If that's the reason, dnssec-signzone already supports this: -N unixtime Niobos

Re: more flexible serial number handling in dnssec-signzone

2010-10-15 Thread Jukka Pakkanen
15.10.2010 20:54, Niobos kirjoitti: What's the advantage of using a date anyway? I too can see when a zone was last edited, even down to the second, by watching the RRSIG(SOA) timing. Time usually goes to one direction only, forward... so using date/time makes sure you are always incrementing

Re: more flexible serial number handling in dnssec-signzone

2010-10-15 Thread Ben McGinnes
On 16/10/10 4:54 AM, Niobos wrote: > > What's the advantage of using a date anyway? I too can see when a zone > was last edited, even down to the second, by watching the RRSIG(SOA) timing. Python 2.6.5 (r265:79359, Mar 24 2010, 01:32:55) [GCC 4.0.1 (Apple Inc. build 5493)] on darwin Type "help",

Re: more flexible serial number handling in dnssec-signzone

2010-10-15 Thread Niobos
On 2010-10-15 19:38, Jay Ford wrote: > I found myself in need of more flexibility in the way dnssec-signzone > handled SOA serial numbers, so I hacked in a way to have the new serial > number generated by calling strftime(3) with a user-specified time > format. I was on the ve

more flexible serial number handling in dnssec-signzone

2010-10-15 Thread Jay Ford
I found myself in need of more flexibility in the way dnssec-signzone handled SOA serial numbers, so I hacked in a way to have the new serial number generated by calling strftime(3) with a user-specified time format. For example dnssec-signzone -N '%Y%m%d1' ... will generat

dnssec-signzone gets verbose

2010-07-24 Thread Göran Uddeborg
After upgrading to bind 9.7.1 recently, some of my scripts started to output text when they shouldn't. Digging a little, I quickly found that dnssec-signzone now unconditionally writes information like this on stderr: Verifying the zone using the following algorithms: RSASHA1.

Re: dnssec-keygen & dnssec-signzone "smart signing" vs time zones

2010-04-28 Thread Paul B. Henson
better implentation anyway, we're still in the early prototyping phase. > From dnssec-signzone [...] >2530144500 denotes 14:45:00 UTC on May 30th, 2000. Perhaps this same example/clarification could be added to the man pages for dnssec-keygen and dnssec-settime under th

Re: dnssec-keygen & dnssec-signzone "smart signing" vs time zones

2010-04-28 Thread Mark Andrews
TAo2qsyX9mW10B48M+slzk3HPGLvCDP5U6iKQWQvtEm4k6/ ml0Xzvnjfc36ynQK4IuffGz FSsYenr01qF+SGizP2pb2LIWYIjyKamYG 34+0c1/5 >From dnssec-signzone -s start-time Specify the date and time when the generated RRSIG records become valid. This can be either an a

Re: dnssec-keygen & dnssec-signzone "smart signing" vs time zones

2010-04-28 Thread Paul B. Henson
On Wed, 28 Apr 2010, Mark Andrews wrote: > The .private timestamps are in UTC and that is what is used for key > management. The .key values are just comments. You should be able to > work out my current offset from UTC. > > % grep Created Kl.+005+59421.* > Kl.+005+59421.key:; Created: T

Re: dnssec-keygen & dnssec-signzone "smart signing" vs time zones

2010-04-28 Thread Mark Andrews
In message , " Paul B. Henson" writes: > > I've been testing dnssec-keygen and the "smart signing" mode of > dnssec-signzone and have run into some timezone confusion; I'm not sure if > it's expected behavior or a bug. I searched around a bit an

dnssec-keygen & dnssec-signzone "smart signing" vs time zones

2010-04-28 Thread Paul B. Henson
I've been testing dnssec-keygen and the "smart signing" mode of dnssec-signzone and have run into some timezone confusion; I'm not sure if it's expected behavior or a bug. I searched around a bit and didn't find anything relevant, apologies in advance if I missed

Re: dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread Evan Hunt
> Seeing this after upgrading to 9.6.2-P1. > > We've made no other changes to the host or any configuration files, etc. > > /var/named # dnssec-signzone -g -o xxx.xxx.gov.au db.xxx.xxx.gov.au > dnssec-signzone: fatal: no self signed KSK's found When dnssec-signz

Re: dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread Nate Itkin
ossible, so sorry > for the size ... > /var/named # dnssec-signzone -z -v 7 -g -o xxx.xxx.xxx.au db.xxx.xxx.xxx.au > dnssec-signzone: using 2 cpus > dnssec-signzone: debug 1: decrement_reference: delete from rbt: 81f2688 [ snip.. ] Is there a key signing key (KSK) in the zone file? db.x

Re: dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread Nate Itkin
On Tue, Mar 30, 2010 at 12:39:58PM +1100, chris liesfield wrote: > Seeing this after upgrading to 9.6.2-P1. > We've made no other changes to the host or any configuration files, etc. > /var/named # dnssec-signzone -g -o xxx.xxx.gov.au db.xxx.xxx.gov.au > dnssec-signzone: fata

dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread chris liesfield
Seeing this after upgrading to 9.6.2-P1. We've made no other changes to the host or any configuration files, etc. /var/named # dnssec-signzone -g -o xxx.xxx.gov.au db.xxx.xxx.gov.au dnssec-signzone: fatal: no self signed KSK's found No idea what's going on here and we need advi

Re: multithreading for dnssec-signzone

2009-12-23 Thread Marco Davids
On 12-23-2009 15:33, Marco Davids wrote: >>> It seems as if my 'dnssec-signzone' runs on one CPU-core only, where as >>> I would have expected it to run on all four. >> >> dnssec-signzone first does a lot of preprocessing on one core, before >> it f

Re: multithreading for dnssec-signzone

2009-12-23 Thread Marco Davids
Op 23-12-2009 15:14, schreef Paul Wouters: > On Wed, 23 Dec 2009, Marco Davids wrote: > >> It seems as if my 'dnssec-signzone' runs on one CPU-core only, where as >> I would have expected it to run on all four. > > dnssec-signzone first does a lot of prep

Re: multithreading for dnssec-signzone

2009-12-23 Thread Paul Wouters
On Wed, 23 Dec 2009, Marco Davids wrote: It seems as if my 'dnssec-signzone' runs on one CPU-core only, where as I would have expected it to run on all four. dnssec-signzone first does a lot of preprocessing on one core, before it finally starts signing with multiple cores. Are you

multithreading for dnssec-signzone

2009-12-23 Thread Marco Davids
Hi all, It seems as if my 'dnssec-signzone' runs on one CPU-core only, where as I would have expected it to run on all four. Specs: - Ubuntu 8.04.3 LTS - bind-9.7.0b1.f1.tar.gz - Quad-core 'Intel(R) Xeon(R) CPU E5335 @ 2.00GHz' (according to '/proc/cpuinfo')

bind-9.7.0a3 genkey.sh and dnssec-signzone missing check

2009-09-21 Thread Paul Wouters
Hi, When using 9.7.0a3 with dnssec-signzone and PKCS#11, one can use the genkey.sh as a tool to generate keys. It is however hardcoded to RSASHA1. (We needed NSECRSASHA1) The below tiny patch addresses this. Related, the dnssec-signzone command created a zone with algo 5 DNSKEY's with

Re: 9.7.0a3: dnssec-signzone signs with passive keys?

2009-09-16 Thread Evan Hunt
> Re-signing the signed zone file, however, also includes signatures from > the passive ZSK, *unless* I remove the DNSKEY records from the zone file > before signing. I guess this is due to the keys already in the signed > zone file overriding the -S switch: Yes, that's a bug. Thank you very much

9.7.0a3: dnssec-signzone signs with passive keys?

2009-09-16 Thread Hauke Lampe
I currently explore the new DNSKEY metadata and dnssec-signzone -S with BIND 9.7.0a3. This feature definitely helps making key management easier and will motivate more operators to sign their zones. Thank you for that. For this test, I created a zone with one manually timed KSK, one active ZSK

Re: Re: BIND 9.7.0a1 and dnssec-signzone verification

2009-06-28 Thread Holger . Zuleger
Thanks to all for the fast reply and the detailed answers. And thank you very mutch for the verifing option of dnssec-signzone. With it (and your help) I've learned again a bit more about dnssec. > In message <20090624211854.a3be222...@thrintun.hactrn.net>, Rob > Austein write

Re: BIND 9.7.0a1 and dnssec-signzone verification

2009-06-24 Thread Mark Andrews
In message <20090624211854.a3be222...@thrintun.hactrn.net>, Rob Austein writes: > At Wed, 24 Jun 2009 18:23:52 +, Evan Hunt wrote: > > > > On Wed, Jun 24, 2009 at 05:45:33PM +0200, holger.zule...@arcor.net wrote: > > > I have some issues with dnss

Re: BIND 9.7.0a1 and dnssec-signzone verification

2009-06-24 Thread Rob Austein
At Wed, 24 Jun 2009 18:23:52 +, Evan Hunt wrote: > > On Wed, Jun 24, 2009 at 05:45:33PM +0200, holger.zule...@arcor.net wrote: > > I have some issues with dnssec-signzone under BIND 9.7.0a1. > > > > I'm using different algorithms for key- and zone signing ke

Re: BIND 9.7.0a1 and dnssec-signzone verification

2009-06-24 Thread Evan Hunt
On Wed, Jun 24, 2009 at 05:45:33PM +0200, holger.zule...@arcor.net wrote: > I have some issues with dnssec-signzone under BIND 9.7.0a1. > > I'm using different algorithms for key- and zone signing keys. That's a problem. > Does it mean that it is no longer possibl

BIND 9.7.0a1 and dnssec-signzone verification

2009-06-24 Thread Holger . Zuleger
I have some issues with dnssec-signzone under BIND 9.7.0a1. I'm using different algorithms for key- and zone signing keys. This is the list of currently used keys: $ dnssec-zkt . Keyname Tag Typ Sta Algorit Generation Time sub.example.de. 5659