Trying to understand DNSSEC and BIND versions better

Jeff Lightner jlightner at water.com
Fri Jun 5 12:09:11 UTC 2009


BIND versions on RHEL (e.g. 9.3.4-6.0.3.P1.el5_2) have backported
patches from later BIND versions so it isn't exactly the same animal as
the EOL 9.3 which is why it isn't listed simply as 9.3

-----Original Message-----
From: bind-users-bounces at lists.isc.org
[mailto:bind-users-bounces at lists.isc.org] On Behalf Of Mark Andrews
Sent: Friday, June 05, 2009 12:23 AM
To: Chris Adams
Cc: comp-protocols-dns-bind at isc.org
Subject: Re: Trying to understand DNSSEC and BIND versions better 


In message <eYSdnVoGu5EsGrXXnZ2dnUVZ_vudnZ2d at posted.hiwaay2>, Chris
Adams write
s:
> Since I read that the root is supposed to be signed by the end of the
> year, I am just trying to understand DNSSEC support and the various
> versions of BIND a little better here, so please don't throw too many
> rocks if I ask something stupid...
> 
> I run the nameservers for an ISP.  For the recursive servers, what are
> the hazzards in enabling DNSSEC (once the root is signed, so no DLV
> necessary I guess)?

	Once the root is signed you will be able to validation answers
	where there is a unbroken chaing of trust.  DLV will still be
	useful for zones were the TLD isn't yet signed or there is
	another break in the chain of trust.

> I know the things that generally break with
> "regular" DNS, but I don't know that with DNSSEC (I know there have
been
> DLV troubles but that's it).

	Not having a clean EDNS path between the validator and
	authoritative server can result in validation failures.
	EDNS responses are bigger that plain DNS and may result in
	fagmented responses.  You need to ensure that any NAT's and
	firewalls are configured to handle fragments UDP responses
	up 4096 bytes with a modern BIND.  Any forwarders used
	should also support EDNS and preferably be performing
	validation as well.

	Failure to re-sign a zone will cause lookups to fail.
	Failure to update DS records on DNSKEY changes will cause
	lookups to fail.  Failure to update DLV records on DNSKEY
	changes will cause lookups to fail.

	"dig +cd +dnssec <query>" is your friend.  This will let
	you see what is failing to validate.

	"dig +cd +multi DNSKEY <zone>" will provide you with the
	keyids necessary to check the signatures.

	"dig +cd +multi DS <zone>" will provide you with the DS
	records so you can check the linkage between parent and
	child.  Look at the key id field.

	"dig +cd +multi DLV <zone>.<dlvroot>" will provide you with the
DS
	records so you can check the linkage between parent and
	child.  Look at the key id field.

	If the zone is using NSEC3 then nsec3hash can be used to
	check workout in the NSEC3 records are sane.

	"date -u +%Y%m%d%H%M%S" returns the system date in a form
	that is easy to comare to the dates in the RRSIG records.

	A understand of how DNSSEC works is useful.

	Checking if you get a DNSKEY returned, without +cd, at each zone
	cut is useful for working out where to examine more closely.

	dig, date and a understanding of DNSSEC is all you should
	need to identify a configuration error.  If the keyid match
	and timestamps are good and associated NSEC/NSEC3 appear
	to be sane the you will most probably have found a
	implementation bug.

> Currently, my servers run BIND 9.3.4-10.P1 (as patched by Red Hat in
> RHEL; we typically stick with their security patched version, since
> that's what we pay them for).  What does that mean with .ORG for
> example, where NSEC3 is used?  Would we just not see NXDOMAIN
responses
> as validated (and what happens to unvalidated responses)?  I've put in
a
> request to Red Hat to update to a version that supports NSEC3 but I
> don't know what their response will be yet.

	BIND 9.3 is already at EOL.

> For our authoritative servers, we'll need to set up a system to sign
the
> zones.  Is it expected that ISPs will sign every zone they serve, or
> just the domains we consider "important"?  What kind of problems might
> be expected here?
> 
> In both cases, what kind of CPU and/or RAM overhead will large-scale
use
> of DNSSEC add?
> -- 
> Chris Adams <cmadams at hiwaay.net>
> Systems and Network Administrator - HiWAAY Internet Services
> I don't speak for anybody but myself - that's enough trouble.
> _______________________________________________
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: marka at isc.org
_______________________________________________
bind-users mailing list
bind-users at lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
 
Please consider our environment before printing this e-mail or attachments.
----------------------------------
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential information and is for the sole use of the intended recipient(s). If you are not the intended recipient, any disclosure, copying, distribution, or use of the contents of this information is prohibited and may be unlawful. If you have received this electronic transmission in error, please reply immediately to the sender that you have received the message in error, and delete it. Thank you.
----------------------------------



More information about the bind-users mailing list