Questions about DNSSEC in Bind

egoitz at sarenet.es egoitz at sarenet.es
Fri Oct 11 06:38:07 UTC 2019


Good afternoon,

I would like to ask you some questions about DNSSEC, which I have not been able to clarify by my own, reading documentation or testing… they are these ones : 

- Is it important or should be signed the whole zone with a “compatible" algorithm as SHA1 and with a stronger one like SHA256 or is it just ok with SHA256?. I would like to avoid the fact that a resolver could have issues validating rrsets… I have seen root servers DS has algorithm id 7. Perhaps is this one the most compatible algorithm for using in DNSSEC?. The most recommended?. Perhaps we should just use for all keys algorithm 7 as have seen some root servers use?.

- If I wanted to sign a zone for instance in 5 and 7 algorithm (if it’s advisable, as isc.org <http://isc.org/> for instance is signed with two algorithms), should I run dnssec-sigzone twice and/or perhaps with two different keys?. Can the same key converted to one kind of key to another (from sha1 to sha256 or sha256 to sha1) for this purpose?. I have seen isc.org <http://isc.org/> does double signing with two different algorithms so… what is the recommended practice here?.

- I have seen the procedure of key rolling over. I have seen there is a manual procedure. Perhaps the most advantageous aspect of manual handling of zone signing, can be that you can revoke privileges to Bind to read the private keys?. I say it, because you generate as root for instance, a signed zone file and then you just serve it as a master zone… and perhaps the flexibility you have with it?.

- By the way, I have seen that exists too the possibility of a slightly less complicated way of signing a zone, the dynamic one, but… you have to update the zone as a dynamic zone with nsupdate for including in the zone the DNSKEYS and you need to manage by your own equally the key regeneration (the keys files generation with dnssec-keygen) for avoiding having your zone signatures expired, am I wrong?….  I think that instead of using this method, perhaps could be better to use inline signing method instead (if you decide discarding totally manual method…)?… which by the way… allows you to not having a ”real” “declared” dynamic zone… with dynamic updates… but… in either dynamic key roll over method, do you have equally to create by your own, new keys (mainly talking now about ZSK because KSK needs to update DS in the root servers) in the key directory of the zone for resigning the zone?. The recommended method for that is dnssec-keygen -S?.

- It seems inline signing method of key rolling over does not allow you to choose the key rolling over method?. How does, inline-signing manage the zone sign in the terms of which key algorithm, rollover method and so, does use?.

- Do you have a minimum time a zsk should be enabled?. I say it, because even setting the zsk key this way : 

; This is a zone-signing key, keyid 45018, for seranet.es <http://seranet.es/>.
; Created: 20191010111754 (Thu Oct 10 13:17:54 2019)
; Publish: 20191010111754 (Thu Oct 10 13:17:54 2019)
; Activate: 20191010111754 (Thu Oct 10 13:17:54 2019)
; Inactive: 20191010131754 (Thu Oct 10 15:17:54 2019)
; Delete: 20191010151754 (Thu Oct 10 17:17:54 2019)
seranet.es <http://seranet.es/>. IN DNSKEY 256 3 8 AwEAAdrLnpJilOPdAh8Y1LLPpLCB+600MqhwuaEVYYQ4wWMXdl+JaeFm wUIVUd3BSR+qz034t7VT/8rtIzc6jXaoOjqvIbnS5NMje49503Fikt7X WwST61AhtghrGFl6Wl27E3WT5s3IlJFDUo1efLy0E18qm5Q8JPkt38zI BJ9339HL


dig seranet.es <http://seranet.es/> a +dnssec

; <<>> DiG 9.10.6 <<>> seranet.es <http://seranet.es/> a +dnssec
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 8734
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;seranet.es <http://seranet.es/>.			IN	A

;; AUTHORITY SECTION:
seranet.es <http://seranet.es/>.		300	IN	SOA	ns1.sarenet.es <http://ns1.sarenet.es/>. dnsmaster.sarenet.es <http://dnsmaster.sarenet.es/>. 2019101005 86400 7200 2592000 300
seranet.es <http://seranet.es/>.		300	IN	RRSIG	SOA 8 2 300 20191109151754 20191010141754 38689 seranet.es <http://seranet.es/>. FCG4zWvtZ3/DfnKuAj+O9drdVFGkmoyGY8PssnMLGG3G5yf0GIXu4dob r/i/BBuV+Y8gtcrbAWRD7TwlWYId6Rlazwn80MJncGH1JVMVtcJIfM+E 8sq6yWBhHkswUX0UCwFpu1/cNg0vKad7VMxtW4ycZEcN3+NnWyU+yT+L g7usDNd6kEB/fsO+9Z3ioCBS0wGzW3Kv/SOlmkhiHkux+Eg/X97G8f8C 1BUXpEtJ/SGY715q+XYn78SowQQ5GjgI2EVgG8qgNFu6zlex2HX8US7T mL62Lu0FS4TNMTPAstiFmEXn4nOAf86jE1IeYLdMGpTd+LOUHM1yOgKn IuAS6Q==
H4MU3S6CAIE18L011AOHNRKSD5FBVEAB.seranet.es <http://h4mu3s6caie18l011aohnrksd5fbveab.seranet.es/>. 300 IN RRSIG NSEC3 8 3 300 20191105235142 20191010141754 38689 seranet.es <http://seranet.es/>. AfCHv2pcGq2bXP9/nRwe7s4g1zBavup1YsbHRF7qhZf5luC3OqnHII+N 2Hz2Gv58/35R+l2tDdEQerzgRF7jOy60sdVRStUX9gmuLUoYgcAUm9dg R52E7QnN0DMvgGwn1ET1JxLzCJ15fCK+rsnkBh7ZKousmMgt7a1psjwM VzcgYsrkBdhv6rNPLEfifbz0X3G+KmdToXIkejkcig+O8jtO2eBGuHfA 7RW2ByH44x6Kw1QGHtg1a+KvgD1R0fpRDH0svuivzKF4fb9YYpviipNV x5MsAduESxm4PviqRTrRfUSC9eJ9Zx08Nr8qh3VRt+TmZtZFJ2p737Sn H+vp6g==
H4MU3S6CAIE18L011AOHNRKSD5FBVEAB.seranet.es <http://h4mu3s6caie18l011aohnrksd5fbveab.seranet.es/>. 300 IN NSEC3 1 0 100 1CA7B3AC V4LV1AUI40OATTPVFINRGQMESCHEUE1F  NS SOA MX RRSIG DNSKEY NSEC3PARAM

The RRSIG sais as expiration date 20191109151754...

- The revoke state of a key, it’s just for emergencies when the private key of the key pair has been compromised?. I mean, the only states you usually see in a key are, published, activate, inactivate and delete?.

- Perhaps the most proper way of handling dnssec is to just use something as : 

zone "seranet.es <http://seranet.es/>" { type master; inline-signing yes; key-directory "/expert/keys/es-domain/named.seranet"; auto-dnssec maintain; file "es-domain/named.seranet"; };

as zone config in Bind, and let inline-signing doing it’s job?. Will it manage the proper algorithms, rollover methods and so?.  If I used this method, we should just have to ensure, that in the key directory we always have a ready inactive key, for rolling over in the needed date and Bind would perform all zone signing tasks (except obviously tell registrar new DS)?… but even will it handle KSK roll over?.


Thanks you so much in advance… There are questions  I have not been able to answer by reading books and at the Internet…

Best regards,



Egoitz Aurrekoetxea
Dpto. de sistemas
944 209 470
Parque Tecnológico. Edificio 103
48170 Zamudio (Bizkaia)
egoitz at sarenet.es <mailto:egoitz at sarenet.es>
www.sarenet.es <http://www.sarenet.es/>
Antes de imprimir este correo electrónico piense si es necesario hacerlo.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20191011/efd59efe/attachment-0001.htm>


More information about the bind-users mailing list