Re: dnssec-policy syntax error in options but not in view

2023-08-04 Thread Matthijs Mekking
What Mark said. So that would become: dnssec-policy "mydefault" { keys { csk key-directory lifetime unlimited algorithm ecdsa256; }; }; options { dnssec-policy "mydefault"; }; On 8/4/23 01:32, Mark Andrews wrote: You can’t define a policy there. You can tell named to use t

RE: monitoring BIND

2023-08-04 Thread sami . rahal
Hello Andrew Thank you for your feedback I am testing some tools including netdata from the list suggested by the isc except that I want to know your feedback about the tools you use especially to monitor latency. Regards De : Andrew Latham Envoyé : jeudi 3 août 2023 16:14 À : RAHAL Sami SOFREC

RE: monitoring BIND

2023-08-04 Thread sami . rahal
Hello Borja Thank you very much for this feedback, yes I confirm that monitoring the latency time is not always obvious, please about this solution you are currently using, there is a tutorial to try it? Thanks in advance. Regards Sami -Message d'origine- De : Borja Marcos Envoyé : ven

question about DNSSEC with PKCS11

2023-08-04 Thread sun guonian
hi, I have tried the DNSSEC sign testing according the document, https://kb.isc.org/docs/bind-9-pkcs11 (and section 5.5 of the Bv9ARM of version 9.18.16) I have two questions about it, 1. since I use HSM(now is softhsm) to store the DNSSEC key, does it more insecure to convert the key(s) from HS