> From shell on the same box, a cmd-line transfer request
>
>       dig -b 127.0.0.1 axfr example.com @127.0.0.1

This one doesn't use TSIG.  If it did, you'd be using the -y option.

> In opendnssec's addns.xml, I've config'd,
> 
>       <?xml version="1.0" encoding="UTF-8"?>
>       <Adapter>
>               <DNS>
>                       <TSIG>
>                               <Name>ods-key</Name>
>                               <Algorithm>hmac-sha256</Algorithm>
>                               <Secret>xxx...xxx</Secret>
>                       </TSIG>

You've configured OpenDNSSEC to use TSIG.  You then need to make
the corresponding configuration on your BIND name server to
recognize that key, in the form

key ods-key {
    algorithm hmac-sha256;
    secret "xxx...xxx";
};

>       Dec 25 11:41:16 dns ods-signerd: [xfrd] bad packet: zone example.com 
> received error code NOTAUTH from 127.0.0.1

This is a hint.

>       Dec 25 11:41:16 dns ods-signerd: [xfrd] zone example.com, from 
> 127.0.0.1 has tsig error (Bad Key)

And this is the smoking gun.

Regards,

- HÃ¥vard
_______________________________________________
Opendnssec-user mailing list
[email protected]
https://lists.opendnssec.org/mailman/listinfo/opendnssec-user

Reply via email to