Hello,

I waited 24 hours and then put my zone back in dnssec.

after 24 everything seems ok... at least by doing a "rndc dnssec -status
...."

everything is in omnipresent:
  Next rollover scheduled on Fri Feb 10 09:15:51 2023
  - goal: omnipresent
  - dnskey: omnipresent
  - ds: omnipresent
  - key rrsig: omnipresent

so it works BUT I need to know more than 48h in advance that the rollover
is starting to submit the new KSK to my registar.

How can I set this up if it's not with "public-safety"?

Regards,
Adrien



Le mer. 25 janv. 2023 à 11:34, Matthijs Mekking <matth...@isc.org> a écrit :

>
>
> On 1/24/23 15:18, adrien sipasseuth wrote:
> > Hello,
> >
> > I don't why DSState: hidden, it's ok with some online check tools like :
> > - https://dnssec-analyzer.verisignlabs.com/
> > <https://dnssec-analyzer.verisignlabs.com/>
> > - https://zonemaster.net/fr/run-test <https://zonemaster.net/fr/run-test
> >
>
> DSState: hidden is what BIND thinks. Note that it does not query yet to
> determine the DSState.
>
>
> >
> > my master is hidden, it can be related ? How i can debug this DSState:
> > hidden ?
>
> It has nothing to do with hidden primaries.
>
>
> > I found this command to check actual status : rndc dnssec -status
> **********
> > This is the output :
> > ....
> > key: 46358 (ECDSAP256SHA256), KSK
> >    published:      yes - since Tue Jan 17 17:55:03 2023
> >    key signing:    yes - since Tue Jan 17 17:55:03 2023
> >
> >    Next rollover scheduled on Tue Jan 24 17:55:03 2023
> >    - goal:           omnipresent
> >    - dnskey:         omnipresent
> >    - ds:             hidden
> >    - key rrsig:      omnipresent
>
> It is hard to determine why your DS is hidden. If all other elements are
> omnipresent, the DS should be rumoured (because you may submit it to the
> parent).
>
> I have a feeling this is because your publish-safety is 3 days. It takes
> an additional 3 days before continuing with the rollover, thus also with
> "making the DS known to the world". In other words, I think BIND does
> not yet think it is safe to publish the DS, hence DS is hidden.
>
> I understand this may not reflect the real world, and perhaps it is a
> bug. If someone issues a "rndc dnssec -checkds published" command", we
> probably should force move the DS state from "hidden" to "rumoured".
>
> Best regards,
>
> Matthijs
>
>
>
>
> > ...
> >
> > Regards Adrien
> >
> > Le mar. 24 janv. 2023 à 09:27, Matthijs Mekking <matth...@isc.org
> > <mailto:matth...@isc.org>> a écrit :
> >
> >     Hi Adrien,
> >
> >     I don't think it is fine yet. I see in your state file the following
> >     line:
> >
> >       > DSState: hidden
> >
> >     This means the DS is not published according to BIND.
> >
> >       > From my understanding, the second KSK should appear because I
> >     put the
> >       > parameter "publish-safety 3d;" that is to say 3 days before the
> >       > expiration ("retired") of the key in use. is that right?
> >
> >     In addition to the DNSKEY TTL yes. The successor KSK should be
> >     pre-published the sum of dnskey-ttl, publish-safety, and
> >     zone-propagation-delay, prior to its retirement.
> >
> >     Best regards,
> >
> >     Matthijs
> >
> >     On 1/24/23 09:08, adrien sipasseuth wrote:
> >      > Hello Matthijs,
> >      >
> >      > Indeed I had not published the DS at my registar because I
> >     thought that
> >      > the second KSK would have appeared anyway at the time of the
> >     rollover.
> >      >
> >      > I published the DS yesterday and I reported to BIND with the
> >     command you
> >      > gave me. I didn't find any error in the logs so everything must
> have
> >      > been fine!
> >      >
> >      > here is the state file of the KSK in use :
> >      > ; This is the state of key 46358, for ***********************.
> >      > Algorithm: 13
> >      > Length: 256
> >      > Lifetime: 604800
> >      > Predecessor: 28887
> >      > KSK: yes
> >      > ZSK: no
> >      > Generated: 20230117165503 (Tue Jan 17 17:55:03 2023)
> >      > Published: 20230117165503 (Tue Jan 17 17:55:03 2023)
> >      > Active: 20230120180003 (Fri Jan 20 19:00:03 2023)
> >      > Retired: 20230127180003 (Fri Jan 27 19:00:03 2023)
> >      > Removed: 20230131190003 (Tue Jan 31 20:00:03 2023)
> >      > DSPublish: 20230123081513 (Mon Jan 23 09:15:13 2023)
> >      > PublishCDS: 20230120180003 (Fri Jan 20 19:00:03 2023)
> >      > DNSKEYChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
> >      > KRRSIGChange: 20230120180003 (Fri Jan 20 19:00:03 2023)
> >      > DSChange: 20230117165503 (Tue Jan 17 17:55:03 2023)
> >      > DNSKEYState: omnipresent
> >      > KRRSIGState: omnipresent
> >      > DSState: hidden
> >      > GoalState: omnipresent
> >      >
> >      >  From my understanding, the second KSK should appear because I
> >     put the
> >      > parameter "publish-safety 3d;" that is to say 3 days before the
> >      > expiration ("retired") of the key in use. is that right?
> >      >
> >      > that is to say tonight at 7pm, I will see tomorrow if this one
> >     appears.
> >      >
> >      > regards, Adrien
> >      >
> >      >
> >      >
> >      > Le jeu. 19 janv. 2023 à 09:13, Matthijs Mekking <matth...@isc.org
> >     <mailto:matth...@isc.org>
> >      > <mailto:matth...@isc.org <mailto:matth...@isc.org>>> a écrit :
> >      >
> >      >     Hi Adrien,
> >      >
> >      >     Without any logs or key **state** files, I can't really tell
> >     what is
> >      >     going on.
> >      >
> >      >     My only gut feeling is that you have never signaled BIND 9
> >     that the DS
> >      >     has been published. You can run 'rndc dnssec -checkds -key
> 12345
> >      >     published example.com <http://example.com>
> >     <http://example.com <http://example.com>>' or set up
> >      >     parental-agents to do it for you.
> >      >
> >      >     Best regards,
> >      >
> >      >     Matthijs
> >      >
> >      >     On 1/17/23 09:38, adrien sipasseuth wrote:
> >      >      > Hello,
> >      >      >
> >      >      > I put the management of DNSSEC with KASP, the zone is well
> >      >     functional.
> >      >      > (dig with "AD" flag etc)
> >      >      >
> >      >      > On the other hand, I can't see when the key rollover
> >     period for
> >      >     my KSK
> >      >      > is over (2 KSKs with a dig DNSKEY...)
> >      >      >
> >      >      > Without KASP, it was easy because I generated the second
> >     KSK key but
> >      >      > with KASP, it is managed automatically.
> >      >      >
> >      >      > So, I have to adapt my scripts to check that there is :
> >      >      >   - a used KSK key and a next KSK key
> >      >      >   - Or only one KSK key used (if we are not in rollover
> phase)
> >      >      >
> >      >      > Except that with my current policy, I never see 2 KSKs via
> >     a "dig
> >      >      > DNSKEY...".
> >      >      > here is my policy :
> >      >      >
> >      >      > dnssec-policy "test" {
> >      >      >      keys {
> >      >      >          ksk lifetime P7D algorithm ecdsa256;
> >      >      >          zsk lifetime P3D algorithm ecdsa256;
> >      >      >      };
> >      >      >      purge-keys 1d;
> >      >      >      publish-safety 3d;
> >      >      >      retire-safety 3d;
> >      >      > };
> >      >      >
> >      >      > I see either my KSK in use or my next KSK (via "dig
> >     DNSKEY...") but
> >      >      > never both at the same time.
> >      >      >
> >      >      > Is this a normal behavior or am I doing it wrong?
> >      >      >
> >      >      > Regards, Adrien
> >      >      >
> >      >     --
> >      >     Visit https://lists.isc.org/mailman/listinfo/bind-users
> >     <https://lists.isc.org/mailman/listinfo/bind-users>
> >      >     <https://lists.isc.org/mailman/listinfo/bind-users
> >     <https://lists.isc.org/mailman/listinfo/bind-users>> to unsubscribe
> >      >     from this list
> >      >
> >      >     ISC funds the development of this software with paid support
> >      >     subscriptions. Contact us at https://www.isc.org/contact/
> >     <https://www.isc.org/contact/>
> >      >     <https://www.isc.org/contact/ <https://www.isc.org/contact/>>
> >     for more information.
> >      >
> >      >
> >      >     bind-users mailing list
> >      > bind-users@lists.isc.org <mailto:bind-users@lists.isc.org>
> >     <mailto:bind-users@lists.isc.org <mailto:bind-users@lists.isc.org>>
> >      > https://lists.isc.org/mailman/listinfo/bind-users
> >     <https://lists.isc.org/mailman/listinfo/bind-users>
> >      >     <https://lists.isc.org/mailman/listinfo/bind-users
> >     <https://lists.isc.org/mailman/listinfo/bind-users>>
> >      >
> >      >
> >     --
> >     Visit https://lists.isc.org/mailman/listinfo/bind-users
> >     <https://lists.isc.org/mailman/listinfo/bind-users> to unsubscribe
> >     from this list
> >
> >     ISC funds the development of this software with paid support
> >     subscriptions. Contact us at https://www.isc.org/contact/
> >     <https://www.isc.org/contact/> for more information.
> >
> >
> >     bind-users mailing list
> >     bind-users@lists.isc.org <mailto:bind-users@lists.isc.org>
> >     https://lists.isc.org/mailman/listinfo/bind-users
> >     <https://lists.isc.org/mailman/listinfo/bind-users>
> >
> >
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to