DNSSEC server failure with trstech.net

Mark Andrews Mark_Andrews at isc.org
Thu Nov 6 13:54:22 UTC 2008


In message <20081106132906.GA15665 at nic.fr>, Stephane Bortzmeyer writes:
> On Thu, Nov 06, 2008 at 02:15:59PM +0100,
>  Gilles Massen <gilles.massen at restena.lu> wrote 
>  a message of 38 lines which said:
> 
> > That seems to be the issue: trstech.net has an DLV entry.
> 
> Right! I completely missed it. Thanks.
> 
> > It kind of illustrates that once you've gone the dnssec path, it
> > hard to go back again...

	No.  It's not hard.  You just need to reverse the order of
	operations.  Remove the DLV / DS then once they have cleared
	the caches you can convert the zone to unsigned.

	If you have announced trust-anchors then it becomes harder
	as you need to find and remove those trust anchors.

	This is where signing the root / using dlv becomes so
	important as there is only a single trust anchor to manage.
	You don't end up with millions of people each with a copy
	of your trust anchor.

> It illustrates also that DNSSEC is a very good way of DoSing yourself.
> 
> Probably, Unbound had no problem because it was not configured to use
> DLV.
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews at isc.org


More information about the bind-users mailing list