Inline signing fails dnsviz test - STILL [LONG]

Mark Andrews marka at isc.org
Sun May 16 06:06:42 UTC 2021



> On 16 May 2021, at 10:17, Dan Egli via bind-users <bind-users at lists.isc.org> wrote:
> 
> On 5/10/2021 12:38 PM, Tony Finch wrote:
>> Dan Egli <dan at newideatest.site>
>>  wrote:
>> 
>>> Still not working for me. The dig doesn't report anything, and I don't HAVE a
>>> keyfile since i'm using inline signing. Or does inline signing still require a
>>> key to be generated?
>>> 
>> Yes, you need to do your own key management with inline-signing using
>> dnssec-keygen. The new dnssec-policy feature can do automatic key
>> management for you.
>> 
>> Tony.
>> 
> 
> So, I updated the settings. Now I have keyfiles generated by bind, as well as a binary .zone.signed in addition to the plain text .zone which has no DNSSEC information at all in it. I ran the signing routine and bind said it was signed good. So I obtained the DS and put in the registrar. Now I am getting SERVFAIL errors whenever I try to query my zone from another name server. Here's what I did:
> 
> #dig newideatest.site dnskey | dnssec-dsfromkey -2 -f - newideatest.site
> newideatest.site. IN DS 49236 13 2 <LONG HASH>
> 
> Ok. Copy the long hash to the Registrar, plug it in. Check, done that.
> 
>  # dig mx newideatest.site @8.8.4.4
> 
> ; <<>> DiG 9.16.15 <<>> mx newideatest.site @8.8.4.4
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 631
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 512
> ;; QUESTION SECTION:
> ;newideatest.site.              IN      MX
> 
> ;; Query time: 50 msec
> ;; SERVER: 8.8.4.4#53(8.8.4.4)
> ;; WHEN: Sat May 15 18:12:44 MDT 2021
> ;; MSG SIZE  rcvd: 45
> ServFail?! WHAT?

This is a known bug fixed in BIND 9.11.25.  Upgrade.  Once the DS is added to .site for
newideatest.site the resolution will work.
  
> So I go to DNSVIZ and run their test. 
> Errors (9)
> 
> 	• newideatest.site/A: No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• newideatest.site/AAAA: No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133,             103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• newideatest.site/DNSKEY (alg 13, id 49236): No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
> 	• newideatest.site/MX: No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
> 	• newideatest.site/NS: No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• newideatest.site/SOA: No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
> 	• newideatest.site/TXT: No RRSIG covering the RRset was returned in the response. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• site to newideatest.site: No valid RRSIGs made by a key corresponding to a DS RR were found covering the DNSKEY RRset, resulting in no secure entry point (SEP) into the zone. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
> 	• site to newideatest.site: The DS RRset for the zone included algorithm 13 (ECDSAP256SHA256), but no DS RR matched a DNSKEY with algorithm 13 that signs the zone's DNSKEY RRset. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
> Warnings (13)
> 
> 	• newideatest.site/A: The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• newideatest.site/AAAA: The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• newideatest.site/DNSKEY (alg 13, id 49236): The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
> 	• newideatest.site/MX: The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
> 	• newideatest.site/NS: The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73, 45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• newideatest.site/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73,             45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
> 	• newideatest.site/TXT: The server responded with no OPT record, rather than with RCODE FORMERR. (31.220.30.73,             45.77.29.133, 103.6.87.125, 119.252.20.56, 2001:19f0:7001:381::3, 2401:1400:1:1201:0:1:7853:1a5, 2403:2500:4000::f3e, 2a04:bdc7:100:1b::3, UDP_-_EDNS0_4096_D_KN)
> 	• site to newideatest.site: The following NS name(s) were found in the authoritative NS RRset, but not in the delegation NS RRset (i.e., in the site zone): jupiter.newideatest.site
> 	• site to newideatest.site: The following NS name(s) were found in the delegation NS RRset (i.e., in the site zone), but not in the authoritative NS RRset: jupiter.eglifamily.name
> 	• site/DS (alg 8, id 51676): DNSSEC specification prohibits signing with DS records that use digest algorithm 1 (SHA-1).
> 	• site/DS (alg 8, id 51676): DNSSEC specification prohibits signing with DS records that use digest algorithm 1 (SHA-1).
> 	• site/DS (alg 8, id 51676): DS records with digest type 1 (SHA-1) are ignored when DS records with digest type 2 (SHA-256) exist in the same RRset.
> 	• site/DS (alg 8, id 51676): DS records with digest type 1 (SHA-1) are ignored when DS records with digest type 2 (SHA-256) exist in the same RRset.
> So, what am I doing wrong? Here's the zone statement for the newideatest.site zone in my named.conf:
> 
>         zone "newideatest.site" {
>                 type master;
>                 file "pri/newideatest.zone";
>                 allow-query { any; };
>                 allow-transfer {
>                   108.61.224.67; 116.203.6.3; 107.191.99.111; 185.22.172.112; 103.6.87.125; 192.184.93.99; 119.252.20.56; 31.220.30.73; 185.34.136.178; 185.136.176.247; 45.77.29.133; 116.203.0.64; 167.88.161.228; 199.195.249.208; 104.244.78.122; 2605:6400:30:fd6e::3; 2605:6400:10:65::3; 2605:6400:20:d5e::3; 2a01:4f8:1c0c:8122::3; 2001:19f0:7001:381::3; 2a06:fdc0:fade:2f7::1; 2a00:dcc7:d3ff:88b2::1; 2a04:bdc7:100:1b::3; 2401:1400:1:1201::1:7853:1a5; 2604:180:1:92a::3; 2403:2500:4000::f3e; 2a00:1838:20:2::cd5e:68e9; 2604:180:2:4cf::3;           2a01:4f8:1c0c:8115::3; 2001:19f0:6400:8642::3;
>                 };
>                 allow-update { trusted; };
>                 key-directory "/var/bind/pri/keys";
>                 inline-signing yes;
>                 dnssec-policy default;
>         };
> };
> Help? If you have errors reaching me, try dan at eglifamily.name, as it doesn't seem to be having issues.
> --Dan Egli
> From my Test Server
> 
> <OpenPGP_0x11B7451DF2015959.asc>_______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list
> 
> ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka at isc.org



More information about the bind-users mailing list