Hi Tom,

On 29-11-2021 09:36, Tom wrote:
Hi

Using BIND-9.16.22:
After some tests with the new KASP feature, I'm running in a issue, where BIND isn't signing the zone anymore.

In the old fashion way (auto-dnssec maintain;), I was able - under some circumstances - to remove the ".signed" and ".signed.jnl" and .jnl-files, restart BIND and everything was fine, the zone was signed automatically with the existing keys.

In the special case now, I removed the ZSK key files and removed all .signed and .signed.jnl and .jnl-files for a zone (like in the old way). The KSK is still existing, a new ZSK is created through the "dnssec-policy":

The dnssec-policy checks the key files against the policy. If you remove the ZSK key files, it has no ZSK any longer while the policy dictates so. That's why it will create a new ZSK.

In other words, don't remove your key files.

(Removing .signed and .jnl files should be fine and be recreated).


## BIND detects the already existing KSK, but logs a warning the the KSK is missing or inactive. 29-Nov-2021 07:28:25.653 dnssec: info: keymgr: DNSKEY example.ch/ECDSAP256SHA256/27534 (ZSK) created for policy thewaytogo-faster 29-Nov-2021 07:28:25.654 dnssec: info: Fetching example.ch/ECDSAP256SHA256/61416 (KSK) from key repository. 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY example.ch/ECDSAP256SHA256/61416 (KSK) is now published 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY example.ch/ECDSAP256SHA256/61416 (KSK) is now active 29-Nov-2021 07:28:25.654 dnssec: info: Fetching example.ch/ECDSAP256SHA256/27534 (ZSK) from key repository. 29-Nov-2021 07:28:25.654 dnssec: info: DNSKEY example.ch/ECDSAP256SHA256/27534 (ZSK) is now published 29-Nov-2021 07:28:25.654 general: info: CDS for key example.ch/ECDSAP256SHA256/61416 is now published 29-Nov-2021 07:28:25.654 general: info: CDNSKEY for key example.ch/ECDSAP256SHA256/61416 is now published 29-Nov-2021 07:28:25.659 dnssec: info: zone example.ch/IN (signed): next key event: 29-Nov-2021 09:33:25.641 29-Nov-2021 07:28:25.660 general: warning: zone example.ch/IN (signed): Key example.ch/ECDSAP256SHA256/61416 missing or inactive and has no replacement: retaining signatures.

I am not able to reproduce this. Is this after a restart or a reload?

Perhaps it's better to report an issue on our gitlab:

    https://gitlab.isc.org/isc-projects/bind9/-/issues/new

Please provide the steps to reproduce and logs with debug level 3.

Best regards,
  Matthijs



## But the KSK (61416) is existing and seems signing
$ rndc dnssec -status example.ch
dnssec-policy: thewaytogo-faster
current time:  Mon Nov 29 09:10:42 2021

key: 61416 (ECDSAP256SHA256), KSK
   published:      yes - since Tue Oct 12 16:50:17 2021
   key signing:    yes - since Tue Oct 12 16:50:17 2021

   No rollover scheduled
   - goal:           omnipresent
   - dnskey:         omnipresent
   - ds:             omnipresent
   - key rrsig:      omnipresent

key: 27534 (ECDSAP256SHA256), ZSK
   published:      yes - since Mon Nov 29 07:28:25 2021
   zone signing:   no

   Next rollover scheduled on Mon Dec  6 05:23:25 2021
   - goal:           omnipresent
   - dnskey:         rumoured
   - zone rrsig:     hidden



So, BIND detects the already existing KSK and ZSK, but is not able to sign the dnskey-rrset with the KSK or some TXT-records with the ZSK.


## DNSKEY RR are existing, the RRSIG is missing
$ dig +short @127.0.0.1 +norec +dnssec dnskey example.ch
256 3 13 3YU6kADe6IRhJ2rcmHOrPgH6tq/7PQQP7VpLBA70p/bPQFPRagdxuGdl XrDg7tQ9WTr553BA5dUGqRBEYYQTUw== 257 3 13 bT4QClt+P9+t1+vF/Ulj7DSISBVMV86TktfNqheiUVGqfZ2hsEpYP140 flVurgV17M/nzujoMW0KgyTuP3p4Kw==


The dnssec-policy looks like this:
dnssec-policy "thewaytogo-faster" {
     signatures-refresh 5d;
     signatures-validity 14d;
     signatures-validity-dnskey 14d;
     dnskey-ttl 3600s;
     publish-safety 1h;
     retire-safety 1h;
     purge-keys 30d;
     keys {
         ksk lifetime unlimited algorithm ecdsap256sha256;
         zsk lifetime 7d algorithm ecdsap256sha256;
     };
     zone-propagation-delay 300s;
     max-zone-ttl 86400s;
     parent-propagation-delay 1h;
     parent-ds-ttl 3600;
};



When running "rndc sign example.ch", then nothing happens -> I'm not sure, if "rndc sign" is still possible with "dnssec-policy"...?

Any hints, how I can recover this state to a working signing-state without recreating a new KSK? I assume, that disabling DNSSEC completely and creating a new ZSK/KSK will work, but in the case now, I already have the mentioned KSK (61416).

Thank you.
Kind regards,
Tom
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list

ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to