[Opendnssec-user] forcing lower serial

2018-07-16 Thread Klaus Darilion
Hi! With ODS 1.2 we use to sign our zones always twice. First with the incoming SOA (unix timestamp) and a second time with a serial of original+2weeks. The first signed zone was deployed in the public. The second with the larger serial was archived and kept for emergency when there would be an o

Re: [Opendnssec-user] Using the same key twice

2014-10-15 Thread Klaus Darilion
I have not used it yet, but it should be possible. Use the same policy for all zones and in the policy set "ShareKeys". See https://wiki.opendnssec.org/display/DOCS/kasp.xml and grep for "ShareKeys". regards Klaus On 13.10.2014 12:15, Jens Link wrote: > Hi, > > a customer wants to use the same

Re: [Opendnssec-user] OpenDNSSEC 2.x roadmap - dynamic updates?

2014-10-07 Thread Klaus Darilion
On 06.10.2014 19:15, Kevin Thompson wrote: > Howdy all, > > I was reading the release plan[1], and I saw mentioned 'Signer - Dynamic > updates'. Could you elaborate on that? > > Currently, the best method I've found for integrating ODS with a dynamic > zone on one server is the CentralNIC patte

Re: [Opendnssec-user] OpenDNSSEC in a hidden master setup

2014-08-26 Thread Klaus Darilion
At first I would start tcpdump on the ODS server and watch if there are incoming NOTIFYs if you increase the serial and reload the master. Then watch out if ODS makes a zone transfer (AXFR or IXFR). Further, the incoming handler of ODS will write the received zone to disk somewhere. Check if you ha

Re: [Opendnssec-user] what key's do i need to submit to Registar.

2014-08-25 Thread Klaus Darilion
25.08.2014 11:40, Bas van den Dikkenberg wrote: > I plan to have 2 standby keys as far as I onderstand I have to publish at > least the active key and both the standby keys right ? > Wat about the with status retired(not dead) > > > -Oorspronkelijk bericht- >

Re: [Opendnssec-user] what key's do i need to submit to Registar.

2014-08-25 Thread Klaus Darilion
On 23.08.2014 17:16, Bas van den Dikkenberg wrote: > Hi , > > > > A question about the key states, I am the process of scripting the > updating the KSK to my registerars. > > > > Does the output of ods-ksmutil key export –zone zome.tld provide me the > keys I need to publish to the regist

Re: AW: [Opendnssec-user] KSK rollover not working in time

2014-07-15 Thread Klaus Darilion
ires. > > Regards > Christoph > > > -Ursprüngliche Nachricht- > Von: Klaus Darilion [mailto:klaus.mailingli...@pernau.at] > Gesendet: Dienstag, 15. Juli 2014 16:38 > An: Malin Christoph; opendnssec-user@lists.opendnssec.org > Betreff: Re: [Opendnssec-user] KSK ro

Re: [Opendnssec-user] KSK rollover not working in time

2014-07-15 Thread Klaus Darilion
On 15.07.2014 16:26, christoph.ma...@vtg.at wrote: > Hi, > > > > I’m playing around with opendnssec. I added a zone to openddnssec and it > was signed. > > Then I changed the date of the Server to (12.07.2015) a few dates > before the KSK retires. > > > > In the log file: > > Rollover o

Re: [Opendnssec-user] high availability

2014-06-26 Thread Klaus Darilion
Hi Emil, comments inline. On 26.06.2014 10:13, Emil Natan wrote: > Hi Klaus and thank you for your response. > > > On Thu, Jun 26, 2014 at 10:45 AM, Klaus Darilion > mailto:klaus.mailingli...@pernau.at>> wrote: > > > > On 25.06.2014 15 :13

Re: [Opendnssec-user] high availability

2014-06-26 Thread Klaus Darilion
On 25.06.2014 15:13, Emil Natan wrote: > Hello, > > My goal is to replicate the ODS configuration between two nodes, one is > active with ODS running and one passive where ODS is not running. > > https://wiki.opendnssec.org/display/DOCS/High+availability > > ... states under the "What to copy"

Re: [Opendnssec-user] Interaction with Thales...

2014-05-28 Thread Klaus Darilion
Ours are quite old too: $ ls -l /opt/nfast/toolkits/pkcs11/ total 11540 -rwxr-xr-x 1 root root32768 Nov 23 2012 ConfigPKCS11onCP -rwxr-xr-x 1 root root 11780890 Nov 23 2012 libcknfast.so We have added this to the ods init scripts: CKNFAST_LOADSHARING=1 export CKNFAST_LOADSHARING regards K

Re: [Opendnssec-user] entropy source for SoftHSM

2014-05-14 Thread Klaus Darilion
I do not know about TRNG. We use haveged which feeds its entropy into the Linux kernel (necessary on virtual servers to get entropy) regards Klaus On 14.05.2014 14:05, Alex Omgovitskij wrote: > Hi, > > The reason I'm looking into SoftHSM - it's free :). and SoftHSM in > connection with TRNG is c

Re: [Opendnssec-user] key ds-seen / Registry Anycast DNS

2013-12-19 Thread Klaus Darilion
On 19.12.2013 14:07, Volker Janzen wrote: PTS PT3600S PT172800S PT10800S And I think this does not match all TLD policies (found already DS records that are valid for 86400 seconds at TLD level. I'll now check the TLDs I want to use and use the maximum T

Re: [Opendnssec-user] key ds-seen / Registry Anycast DNS

2013-12-19 Thread Klaus Darilion
On 19.12.2013 13:25, Volker Janzen wrote: I'm using the DelegationSignerCommand to get notified, if OpenDNSSEC wants me to do an update on a domain. This currently triggers a domain update (by a simple script) with my domain registrar. The command gets exactly one DNSKEY (the new one). From thi

Re: [Opendnssec-user] key ds-seen / Registry Anycast DNS

2013-12-19 Thread Klaus Darilion
On 19.12.2013 10:16, Volker Janzen wrote: Hi, I'm currently working on automated KSK rollovers with my registrars API. I remember a discussion that it's difficult to say if a DS record can be assumed as seen, because with Anycast DNS you cannot check all nameservers from your location (or even

Re: [Opendnssec-user] ods uses a different key for signing than reported by ods-ksmutil

2013-11-19 Thread Klaus Darilion
r engine". Obviously the signer re-reads the signconf not only on "update", but also on restart. This makes sense, as the singer could have missed an "update" while it was not running. Thanks for the troubleshooting hints Klaus On 15.11.2013 13:42, Klaus Darilion wro

Re: [Opendnssec-user] Monitoring OpenDNSSEC

2013-11-15 Thread Klaus Darilion
On 15.11.2013 13:02, Volker Janzen wrote: Hi, On Wed, 6 Nov 2013 16:28:53 +0100, Jerry Lundström wrote: You can monitor the ods-enforcerd and ods-signerd processes, use the "ods-signer running" and there should be a pid file somewhere (depend on the OS or if you compiled yourself). accordi

Re: [Opendnssec-user] ods uses a different key for signing than reported by ods-ksmutil

2013-11-15 Thread Klaus Darilion
On 14.11.2013 15:13, Matthijs Mekking wrote: On 11/14/2013 02:26 PM, Klaus Darilion wrote: Meanwhile I restarted the ods-signer daemon and after the next zone file update, ods signed with the correct key. So for now it is fixed, but do you have any ideas why the signer still used the old KSK

Re: [Opendnssec-user] ods uses a different key for signing than reported by ods-ksmutil

2013-11-14 Thread Klaus Darilion
On 14.11.2013 09:57, Matthijs Mekking wrote: Hi Klaus, On 11/14/2013 09:37 AM, Klaus Darilion wrote: Some more debugging: # ods-hsmutil list| grep repo | grep 2048 repo 16fc0831b9e0738059c02291e0b0a140 RSA/2048 <-reported by ksmutil repo ddc556f6df689c9801028b1c6db47ed7 RSA/2048 <

Re: [Opendnssec-user] ods uses a different key for signing than reported by ods-ksmutil

2013-11-14 Thread Klaus Darilion
er the KSK rollover? Thanks Klaus On 14.11.2013 08:37, Klaus Darilion wrote: Hi! I have a strange problem. ODS 1.3.15 with nCipher HSM. The HSM is splitted into respoitories, with every zone signed by ODS having their own repository with keys. For some zones, everything works fine, but fo

[Opendnssec-user] ods uses a different key for signing than reported by ods-ksmutil

2013-11-13 Thread Klaus Darilion
Hi! I have a strange problem. ODS 1.3.15 with nCipher HSM. The HSM is splitted into respoitories, with every zone signed by ODS having their own repository with keys. For some zones, everything works fine, but for some zones, ODS uses a different key for signing than it reports with ods-ksmut

[Opendnssec-user] DNSKEY keytag calculation differencens between ods-hsmutil and ods-ksmutil

2013-11-13 Thread Klaus Darilion
Hi! Using ODS 1.3.15 and nCipher HSMs: The key itself is identical, but the calculated tag differs when calculated by ods-hsmutil: KSKs have an offset of 4 (and reported falsly as ZSK), ZSKs have an offset of 3. See output below. Thanks Klaus # ods-ksmutil key list -v SQLite database set to

Re: [Opendnssec-user] Zones in different views with the same name

2013-10-03 Thread Klaus Darilion
On 03.10.2013 10:25, Havard Eidnes wrote: For some zones I have multiple views with different content. How can I configure this in OpenDNSSec in combination with SoftHSM? My opinion: I think you are stretching the DNS model too far by trying to do this. But ... if you really want the associ

Re: [Opendnssec-user] Must have DNS notify?

2013-08-09 Thread Klaus Darilion
On 08.08.2013 14:46, Havard Eidnes wrote: It seems to me that when you configure OpenDNSSEC to use DNS to fetch an unsigned zone and provide a signed zone, it behaves differently from a proper DNS server in one important aspect, namely that it does not appear to do periodic SOA queries towards

Re: [Opendnssec-user] Maximum key generation interval on 64-bit systems

2013-07-18 Thread Klaus Darilion
On 18.07.2013 15:27, Sara Dickinson wrote: On 17 Jul 2013, at 10:32, Klaus Darilion wrote: Attached is the patch (against ods 1.3.9), feel free to use it (it would be nice if this feature is added to ODS). Thanks Klaus - this does look simple! We will review and try to include in an

Re: [Opendnssec-user] Maximum key generation interval on 64-bit systems

2013-07-17 Thread Klaus Darilion
In the end it seems that a feature request is necessary, e.g. an option to ignore the the zonelist but specify the number of zones on the command line, e.g.: ods-ksmutil key generate --policy default \ --zonecount [number of zones to generate keys] \ --interval [PERIOD] In the

Re: [Opendnssec-user] Maximum key generation interval on 64-bit systems

2013-07-17 Thread Klaus Darilion
On 17.07.2013 00:15, Sebastian Castro wrote: On 17/07/13 02:26, Gavin Brown wrote: Hi Klaus, Hi Gavin, On 16.07.2013 13:30, Gavin Brown wrote: Hi there, We are evaluating an HSM for use with OpenDNSSEC. The vendor has suggested that we consider manually generating all the keys we are l

Re: [Opendnssec-user] Maximum key generation interval on 64-bit systems

2013-07-16 Thread Klaus Darilion
On 16.07.2013 17:49, Gavin Brown wrote: We are evaluating an HSM for use with OpenDNSSEC. The vendor has suggested that we consider manually generating all the keys we are likely to need up-front, so that we only ever need to do a single backup. Btw: What HSMs do you use? We use nCipher and t

Re: [Opendnssec-user] Maximum key generation interval on 64-bit systems

2013-07-16 Thread Klaus Darilion
On 16.07.2013 16:26, Gavin Brown wrote: Hi Klaus, On 16.07.2013 13:30, Gavin Brown wrote: Hi there, We are evaluating an HSM for use with OpenDNSSEC. The vendor has suggested that we consider manually generating all the keys we are likely to need up-front, so that we only ever need to do a

Re: [Opendnssec-user] Maximum key generation interval on 64-bit systems

2013-07-16 Thread Klaus Darilion
On 16.07.2013 13:30, Gavin Brown wrote: Hi there, We are evaluating an HSM for use with OpenDNSSEC. The vendor has suggested that we consider manually generating all the keys we are likely to need up-front, so that we only ever need to do a single backup. We're using this command to generate

Re: [Opendnssec-user] running ODS concurrently on one server

2013-07-09 Thread Klaus Darilion
On 09.07.2013 21:26, Rick van Rein (OpenFortress) wrote: These are coloured findings, I know; I had a nasty afternoon;-) Be sure to counter me if you have had better experiences! I tried the "apt-get install p11-kit" (v0.12) version. Installation was fine, but I failed to configure it and

Re: [Opendnssec-user] running ODS concurrently on one server

2013-07-09 Thread Klaus Darilion
On 09.07.2013 17:27, Casper Gielen wrote: Op 09-07-13 16:49, Klaus Darilion schreef:> btw: I just found pkcs11-proxy and some basic testing works fine. Does anybody have practical experience with pkcs11-proxy? I once tried to built a network-HSM by combining softhsm, pkcs11-proxy

Re: [Opendnssec-user] running ODS concurrently on one server

2013-07-09 Thread Klaus Darilion
On 09.07.2013 16:49, Klaus Darilion wrote: On 08.07.2013 17:53, Joe Abley wrote: Hi Klaus, On 2013-07-08, at 09:13, Klaus Darilion wrote: I want to sign a certain zone multiple times: 1x the original zone + 1x a modified "backup" zone (change SOA serial and maybe some oth

Re: [Opendnssec-user] running ODS concurrently on one server

2013-07-09 Thread Klaus Darilion
On 08.07.2013 17:53, Joe Abley wrote: Hi Klaus, On 2013-07-08, at 09:13, Klaus Darilion wrote: I want to sign a certain zone multiple times: 1x the original zone + 1x a modified "backup" zone (change SOA serial and maybe some other records) CIRA's signing infrastructure wi

[Opendnssec-user] running ODS concurrently on one server

2013-07-08 Thread Klaus Darilion
Hi! I want to sign a certain zone multiple times: 1x the original zone + 1x a modified "backup" zone (change SOA serial and maybe some other records) As far as I see it is not possible to sign the same zone multiple times within the same ODS instance. Thus, I thought of starting the signer d

[Opendnssec-user] Auditor Problem (ods 1.3.9)

2013-06-28 Thread Klaus Darilion
Hi! For testing I created a policy with rather short intervals (see below). I now have the problem, that I have to disable the auditor as it complains: ods-auditor[2778]: test : Key (6670) has gone straight to active use without a prepublished phase Of course this is not true. There was a pu

Re: [Opendnssec-user] Force a fast key rollover

2013-06-28 Thread Klaus Darilion
On 28.06.2013 01:53, Sebastian Castro wrote: On 28/06/13 03:15, Klaus Darilion wrote: Hi! Hi!, When initiating a key rollover, OpenDNSSEC does not immediately use the new key, but uses the PUBLISH state (at least for ksk) for some time before activating the key (before "waiting f

[Opendnssec-user] Force a fast key rollover

2013-06-27 Thread Klaus Darilion
Hi! When initiating a key rollover, OpenDNSSEC does not immediately use the new key, but uses the PUBLISH state (at least for ksk) for some time before activating the key (before "waiting for DS"), How can I force ODS to immediately activate a new KSK and ZSK, without these "pre-activate" ph

[Opendnssec-user] SoftHSM Setup Question

2013-06-21 Thread Klaus Darilion
Hi! I want to use OpenDNSSEC for ~15 Zones. Each zone will use their own keys (no key sharing) and the same policy for the beginning, but it should be possible to change the policy for a certain zone later. Thus I think it would be smart to start with 15 policies, although they all look the s

[Opendnssec-user] Key Management: History and Future

2013-03-11 Thread Klaus Darilion
Hi! As an ODS newbie I try to understand the key usage of ODS in an existing ODS deployment. "ods-hsmutil list" shows me plenty of keys. Some of them are currently used, some of them are "removed", and some of them will be used in the future. Unfortunately "ods-ksmutil key list -v" only show