dnssec-policy is not signing anymore

Tom lists at verreckte-cheib.ch
Mon Nov 29 20:12:05 UTC 2021


Hi Matthijs

I've tried several times to reproduce this behavior..., dnssec-policy 
always does his job. I did not currently succeed in reproducing the 
behavior. I will make a few more attempts and otherwise inform you.

Thank you.
Best regards,
Tom


On 29.11.21 10:56, Matthijs Mekking wrote:
> Hi Tom,
> 
> On 29-11-2021 09:36, Tom wrote:
>> Hi
>>
>> Using BIND-9.16.22:
>> After some tests with the new KASP feature, I'm running in a issue, 
>> where BIND isn't signing the zone anymore.
>>
>> In the old fashion way (auto-dnssec maintain;), I was able - under 
>> some circumstances - to remove the ".signed" and ".signed.jnl" and 
>> .jnl-files, restart BIND and everything was fine, the zone was signed 
>> automatically with the existing keys.
>>
>> In the special case now, I removed the ZSK key files and removed all 
>> .signed and .signed.jnl and .jnl-files for a zone (like in the old 
>> way). The KSK is still existing, a new ZSK is created through the 
>> "dnssec-policy":
> 
> The dnssec-policy checks the key files against the policy. If you remove 
> the ZSK key files, it has no ZSK any longer while the policy dictates 
> so. That's why it will create a new ZSK.
> 
> In other words, don't remove your key files.
> 
> (Removing .signed and .jnl files should be fine and be recreated).
> 
> 
>> ## BIND detects the already existing KSK, but logs a warning the the 
>> KSK is missing or inactive.
>> 29-Nov-2021 07:28:25.653 dnssec: info: keymgr: DNSKEY 
>> example.ch/ECDSAP256SHA256/27534 (ZSK) created for policy 
>> thewaytogo-faster
>> 29-Nov-2021 07:28:25.654 dnssec: info: Fetching 
>> example.ch/ECDSAP256SHA256/61416 (KSK) from key repository.
>> 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY 
>> example.ch/ECDSAP256SHA256/61416 (KSK) is now published
>> 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY 
>> example.ch/ECDSAP256SHA256/61416 (KSK) is now active
>> 29-Nov-2021 07:28:25.654 dnssec: info: Fetching 
>> example.ch/ECDSAP256SHA256/27534 (ZSK) from key repository.
>> 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY 
>> example.ch/ECDSAP256SHA256/27534 (ZSK) is now published
>> 29-Nov-2021 07:28:25.654 general: info: CDS for key 
>> example.ch/ECDSAP256SHA256/61416 is now published
>> 29-Nov-2021 07:28:25.654 general: info: CDNSKEY for key 
>> example.ch/ECDSAP256SHA256/61416 is now published
>> 29-Nov-2021 07:28:25.659 dnssec: info: zone example.ch/IN (signed): 
>> next key event: 29-Nov-2021 09:33:25.641
>> 29-Nov-2021 07:28:25.660 general: warning: zone example.ch/IN 
>> (signed): Key example.ch/ECDSAP256SHA256/61416 missing or inactive and 
>> has no replacement: retaining signatures.
> 
> I am not able to reproduce this. Is this after a restart or a reload?
> 
> Perhaps it's better to report an issue on our gitlab:
> 
>      https://gitlab.isc.org/isc-projects/bind9/-/issues/new
> 
> Please provide the steps to reproduce and logs with debug level 3.
> 
> Best regards,
>    Matthijs
> 
> 
> 
>> ## But the KSK (61416) is existing and seems signing
>> $ rndc dnssec -status example.ch
>> dnssec-policy: thewaytogo-faster
>> current time:  Mon Nov 29 09:10:42 2021
>>
>> key: 61416 (ECDSAP256SHA256), KSK
>>    published:      yes - since Tue Oct 12 16:50:17 2021
>>    key signing:    yes - since Tue Oct 12 16:50:17 2021
>>
>>    No rollover scheduled
>>    - goal:           omnipresent
>>    - dnskey:         omnipresent
>>    - ds:             omnipresent
>>    - key rrsig:      omnipresent
>>
>> key: 27534 (ECDSAP256SHA256), ZSK
>>    published:      yes - since Mon Nov 29 07:28:25 2021
>>    zone signing:   no
>>
>>    Next rollover scheduled on Mon Dec  6 05:23:25 2021
>>    - goal:           omnipresent
>>    - dnskey:         rumoured
>>    - zone rrsig:     hidden
>>
>>
>>
>> So, BIND detects the already existing KSK and ZSK, but is not able to 
>> sign the dnskey-rrset with the KSK or some TXT-records with the ZSK.
>>
>>
>> ## DNSKEY RR are existing, the RRSIG is missing
>> $ dig +short @127.0.0.1 +norec +dnssec dnskey example.ch
>> 256 3 13 3YU6kADe6IRhJ2rcmHOrPgH6tq/7PQQP7VpLBA70p/bPQFPRagdxuGdl 
>> XrDg7tQ9WTr553BA5dUGqRBEYYQTUw==
>> 257 3 13 bT4QClt+P9+t1+vF/Ulj7DSISBVMV86TktfNqheiUVGqfZ2hsEpYP140 
>> flVurgV17M/nzujoMW0KgyTuP3p4Kw==
>>
>>
>> The dnssec-policy looks like this:
>> dnssec-policy "thewaytogo-faster" {
>>      signatures-refresh 5d;
>>      signatures-validity 14d;
>>      signatures-validity-dnskey 14d;
>>      dnskey-ttl 3600s;
>>      publish-safety 1h;
>>      retire-safety 1h;
>>      purge-keys 30d;
>>      keys {
>>          ksk lifetime unlimited algorithm ecdsap256sha256;
>>          zsk lifetime 7d algorithm ecdsap256sha256;
>>      };
>>      zone-propagation-delay 300s;
>>      max-zone-ttl 86400s;
>>      parent-propagation-delay 1h;
>>      parent-ds-ttl 3600;
>> };
>>
>>
>>
>> When running "rndc sign example.ch", then nothing happens -> I'm not 
>> sure, if "rndc sign" is still possible with "dnssec-policy"...?
>>
>> Any hints, how I can recover this state to a working signing-state 
>> without recreating a new KSK?
>> I assume, that disabling DNSSEC completely and creating a new ZSK/KSK 
>> will work, but in the case now, I already have the mentioned KSK (61416).
>>
>> Thank you.
>> Kind regards,
>> Tom
>> _______________________________________________
>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
>> unsubscribe from this list
>>
>> ISC funds the development of this software with paid support 
>> subscriptions. Contact us at https://www.isc.org/contact/ for more 
>> information.
>>
>>
>> bind-users mailing list
>> bind-users at lists.isc.org
>> https://lists.isc.org/mailman/listinfo/bind-users
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
> unsubscribe from this list
> 
> ISC funds the development of this software with paid support 
> subscriptions. Contact us at https://www.isc.org/contact/ for more 
> information.
> 
> 
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users


More information about the bind-users mailing list