Re: dnssec: ds showing hidden 3+ days after key roll

2022-02-11 Thread Matthijs Mekking

Hi Larry,

This is documented in the DNSSEC RFCs, but AFAICS it is not mentioned in 
our documentation. I created a merge request to add such a note in the 
appropriate places:


https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/5823

Best regards,

Matthijs

On 10-02-2022 18:23, Larry Rosenman wrote:

On 02/10/2022 10:10 am, Matthijs Mekking wrote:

Hi,

There are several things wrong here. The gist of it is that there is
no valid ZSK and since the zone is not properly signed, BIND does not
want to publish the DS record (even if outside BIND you already
published the DS).

You can tell that BIND does not agree because it did not publish a CDS
record in your zone.

I also noticed two different algorithms. I hadn't noticed it before
but your policy says:

    keys {
    ksk lifetime unlimited algorithm 8 2048 ;
    zsk lifetime 30d algorithm 13;
    };

This is a garbage policy because you specify different algorithms for
the ksk and the zsk. This can never result in a validly signed zone.

Change the algorithm of the keys so that they match.

Perhaps we can add a named-checkconf check for this.


Best regards,

Matthijs


[snip]

Thanks!   Is that little nuance documented?  (The need for KSK and ZSK 
to be aligned on type of key)



--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec: ds showing hidden 3+ days after key roll

2022-02-10 Thread Larry Rosenman via bind-users

On 02/10/2022 10:10 am, Matthijs Mekking wrote:

Hi,

There are several things wrong here. The gist of it is that there is
no valid ZSK and since the zone is not properly signed, BIND does not
want to publish the DS record (even if outside BIND you already
published the DS).

You can tell that BIND does not agree because it did not publish a CDS
record in your zone.

I also noticed two different algorithms. I hadn't noticed it before
but your policy says:

keys {
ksk lifetime unlimited algorithm 8 2048 ;
zsk lifetime 30d algorithm 13;
};

This is a garbage policy because you specify different algorithms for
the ksk and the zsk. This can never result in a validly signed zone.

Change the algorithm of the keys so that they match.

Perhaps we can add a named-checkconf check for this.


Best regards,

Matthijs


[snip]

Thanks!   Is that little nuance documented?  (The need for KSK and ZSK 
to be aligned on type of key)


--
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 214-642-9640 E-Mail: l...@lerctr.org
US Mail: 5708 Sabbia Dr, Round Rock, TX 78665-2106
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec: ds showing hidden 3+ days after key roll

2022-02-10 Thread Matthijs Mekking

Hi,

There are several things wrong here. The gist of it is that there is no 
valid ZSK and since the zone is not properly signed, BIND does not want 
to publish the DS record (even if outside BIND you already published the 
DS).


You can tell that BIND does not agree because it did not publish a CDS 
record in your zone.


I also noticed two different algorithms. I hadn't noticed it before but 
your policy says:


keys {
ksk lifetime unlimited algorithm 8 2048 ;
zsk lifetime 30d algorithm 13;
};

This is a garbage policy because you specify different algorithms for 
the ksk and the zsk. This can never result in a validly signed zone.


Change the algorithm of the keys so that they match.

Perhaps we can add a named-checkconf check for this.


Best regards,

Matthijs





On 10-02-2022 15:47, Larry Rosenman wrote:

version: bind9-devel-9.17.18.a0.2021.10.08

Debug logs from yesterday for this zone (none in todays log):
<183>1 2022-02-09T02:18:28.587884-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/8385 (policy ler1)
<183>1 2022-02-09T02:18:28.587906-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/34851 (policy ler1)
<183>1 2022-02-09T02:18:28.587918-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/20014 (policy ler1)
<183>1 2022-02-09T02:18:28.587928-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/ECDSAP256SHA256/6539 (policy ler1)
<183>1 2022-02-09T02:18:28.587939-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/269 (policy ler1)
<183>1 2022-02-09T02:18:28.587949-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: dnskeys: 
lerctr.org/ECDSAP256SHA256/6539 (policy ler1)
<183>1 2022-02-09T02:18:28.587960-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: dnskeys: 
lerctr.org/RSASHA256/269 (policy ler1)
<183>1 2022-02-09T02:18:28.588003-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/RSASHA256/20014 (KSK) matches policy ler1
<183>1 2022-02-09T02:18:28.588020-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/RSASHA256/269 (KSK) matches policy ler1
<183>1 2022-02-09T02:18:28.588032-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/RSASHA256/269 (KSK) is active in policy ler1
<183>1 2022-02-09T02:18:28.588045-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: new 
successor needed for DNSKEY lerctr.org/RSASHA256/269 (KSK) (policy ler1) 
in 2650572588 seconds
<183>1 2022-02-09T02:18:28.588056-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/ECDSAP256SHA256/6539 (ZSK) matches policy ler1
<183>1 2022-02-09T02:18:28.588067-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/ECDSAP256SHA256/6539 (ZSK) is active in policy ler1
<183>1 2022-02-09T02:18:28.588079-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: new 
successor needed for DNSKEY lerctr.org/ECDSAP256SHA256/6539 (ZSK) 
(policy ler1) in 2379102 seconds
<183>1 2022-02-09T02:18:28.588090-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: examine ZSK 
lerctr.org/RSASHA256/8385 type DNSKEY in state HIDDEN
<183>1 2022-02-09T02:18:28.588101-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: ZSK 
lerctr.org/RSASHA256/8385 type DNSKEY in stable state HIDDEN
<183>1 2022-02-09T02:18:28.588111-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: examine ZSK 
lerctr.org/RSASHA256/8385 type ZRRSIG in state UNRETENTIVE
<183>1 2022-02-09T02:18:28.588122-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: can we 
transition ZSK lerctr.org/RSASHA256/8385 type ZRRSIG state UNRETENTIVE 
to state HIDDEN?
<183>1 2022-02-09T02:18:28.588143-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: dnssec 
evaluation of ZSK lerctr.org/RSASHA256/8385 record ZRRSIG: rule1=(~false 
or false) rule2=(~true or true) rule3=(~true or true)
<183>1 2022-02-09T02:18:28.588162-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: time says no 
to ZSK lerctr.org/RSASHA256/8385 type ZRRSIG state 

Re: dnssec: ds showing hidden 3+ days after key roll

2022-02-10 Thread Larry Rosenman

version: bind9-devel-9.17.18.a0.2021.10.08

Debug logs from yesterday for this zone (none in todays log):
<183>1 2022-02-09T02:18:28.587884-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/8385 (policy ler1)
<183>1 2022-02-09T02:18:28.587906-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/34851 (policy ler1)
<183>1 2022-02-09T02:18:28.587918-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/20014 (policy ler1)
<183>1 2022-02-09T02:18:28.587928-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/ECDSAP256SHA256/6539 (policy ler1)
<183>1 2022-02-09T02:18:28.587939-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: keyring: 
lerctr.org/RSASHA256/269 (policy ler1)
<183>1 2022-02-09T02:18:28.587949-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: dnskeys: 
lerctr.org/ECDSAP256SHA256/6539 (policy ler1)
<183>1 2022-02-09T02:18:28.587960-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: dnskeys: 
lerctr.org/RSASHA256/269 (policy ler1)
<183>1 2022-02-09T02:18:28.588003-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.587 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/RSASHA256/20014 (KSK) matches policy ler1
<183>1 2022-02-09T02:18:28.588020-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/RSASHA256/269 (KSK) matches policy ler1
<183>1 2022-02-09T02:18:28.588032-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/RSASHA256/269 (KSK) is active in policy ler1
<183>1 2022-02-09T02:18:28.588045-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: new 
successor needed for DNSKEY lerctr.org/RSASHA256/269 (KSK) (policy ler1) 
in 2650572588 seconds
<183>1 2022-02-09T02:18:28.588056-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/ECDSAP256SHA256/6539 (ZSK) matches policy ler1
<183>1 2022-02-09T02:18:28.588067-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: DNSKEY 
lerctr.org/ECDSAP256SHA256/6539 (ZSK) is active in policy ler1
<183>1 2022-02-09T02:18:28.588079-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: new 
successor needed for DNSKEY lerctr.org/ECDSAP256SHA256/6539 (ZSK) 
(policy ler1) in 2379102 seconds
<183>1 2022-02-09T02:18:28.588090-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: examine ZSK 
lerctr.org/RSASHA256/8385 type DNSKEY in state HIDDEN
<183>1 2022-02-09T02:18:28.588101-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: ZSK 
lerctr.org/RSASHA256/8385 type DNSKEY in stable state HIDDEN
<183>1 2022-02-09T02:18:28.588111-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: examine ZSK 
lerctr.org/RSASHA256/8385 type ZRRSIG in state UNRETENTIVE
<183>1 2022-02-09T02:18:28.588122-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: can we 
transition ZSK lerctr.org/RSASHA256/8385 type ZRRSIG state UNRETENTIVE 
to state HIDDEN?
<183>1 2022-02-09T02:18:28.588143-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: dnssec 
evaluation of ZSK lerctr.org/RSASHA256/8385 record ZRRSIG: rule1=(~false 
or false) rule2=(~true or true) rule3=(~true or true)
<183>1 2022-02-09T02:18:28.588162-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: time says no 
to ZSK lerctr.org/RSASHA256/8385 type ZRRSIG state UNRETENTIVE to state 
HIDDEN (wait 662502 seconds)
<183>1 2022-02-09T02:18:28.588174-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: examine ZSK 
lerctr.org/RSASHA256/34851 type DNSKEY in state HIDDEN
<183>1 2022-02-09T02:18:28.588184-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: ZSK 
lerctr.org/RSASHA256/34851 type DNSKEY in stable state HIDDEN
<183>1 2022-02-09T02:18:28.588194-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: examine ZSK 
lerctr.org/RSASHA256/34851 type ZRRSIG in state UNRETENTIVE
<183>1 2022-02-09T02:18:28.588205-06:00 thebighonker.lerctr.org named 
44101 - - 09-Feb-2022 02:18:28.588 dnssec: debug 1: keymgr: can we 
transition ZSK lerctr.org/RSASHA256/34851 type ZRRSIG state UNRETENTIVE 
to state 

Re: dnssec: ds showing hidden 3+ days after key roll

2022-02-10 Thread Matthijs Mekking

Hi Larry,

There has been several bug fixes for dnssec-policy since its 
introduction. What version of 9.17 are you running?


I can't tell what causes the ds to stay in the hidden state. The timings 
in the state file should allow it to move to the next state.


If you were able to turn on logging, on each run the keymgr will tell 
you the reason why it cannot move the DS to the next state. Such logs 
happen on DEBUG(1) level.


Best regards,

Matthijs



On 09-02-2022 17:35, Larry Rosenman wrote:

On 02/09/2022 9:52 am, Matthijs Mekking wrote:

Hi Larry,

Without more information it is hard to tell what is going on.

Can you share your dnssec-policy and the contents of the key state
file? And if you have useful logs (grep for keymgr) that would be
handy too to see what is going on.

If you prefer to share them off list, you can mail them me directly.

Best regards,

Matthijs

On 08-02-2022 18:00, Larry Rosenman wrote:

Greetings,
 new poster.  I just converted over to DNSSEC-policy,  and rolled 
my KSK.  I see:

key: 269 (RSASHA256), KSK
   published:  yes - since Sun Feb  6 14:31:32 2022
   key signing:    yes - since Sun Feb  6 14:31:32 2022

   No rollover scheduled
   - goal:   omnipresent
   - dnskey: omnipresent
   - ds: hidden
   - key rrsig:  omnipresent


ler in thebighonker in namedb on  master [!] as 慄
❯

Is it normal to see the ds as hidden?  It IS published, and I told 
rndc that.


Any insight appreciated.



thebighonker# cat Klerctr.org.+008+00269.state
; This is the state of key 269, for lerctr.org.
Algorithm: 8
Length: 2048
Lifetime: 0
Predecessor: 20014
KSK: yes
ZSK: no
Generated: 20220206203132 (Sun Feb  6 14:31:32 2022)
Published: 20220206203132 (Sun Feb  6 14:31:32 2022)
Active: 20220206213632 (Sun Feb  6 15:36:32 2022)
DSPublish: 20220207015646 (Sun Feb  6 19:56:46 2022)
PublishCDS: 20220206223632 (Sun Feb  6 16:36:32 2022)
DNSKEYChange: 20220206223632 (Sun Feb  6 16:36:32 2022)
KRRSIGChange: 20220206223632 (Sun Feb  6 16:36:32 2022)
DSChange: 20220206203132 (Sun Feb  6 14:31:32 2022)
DNSKEYState: omnipresent
KRRSIGState: omnipresent
DSState: hidden
GoalState: omnipresent
thebighonker#

dnssec-policy "ler1" {
    keys {
    ksk lifetime unlimited algorithm 8 2048 ;
    zsk lifetime 30d algorithm 13;
    };
    // Key timings
    dnskey-ttl 3600;
    publish-safety 1h;
    retire-safety 1h;
    purge-keys P90D;
    // Signature timings
    signatures-refresh 5d;
    signatures-validity 14d;
    signatures-validity-dnskey 14d;
    // Zone parameters
    max-zone-ttl 86400;
    zone-propagation-delay 300;
    // Parent parameters
    parent-ds-ttl 86400;
    parent-propagation-delay 1h;
    nsec3param iterations 0 salt-length 0;
};

Unfortunately my 9.17(alpha) named got into a signing loop, so I don't 
want to look through that logging.


I know -- I need to update to 9.18, but am waiting on the FreeBSD port 
maintainer to add 9.18 to the ports tree

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec: ds showing hidden 3+ days after key roll

2022-02-09 Thread Matthijs Mekking

Hi Larry,

Without more information it is hard to tell what is going on.

Can you share your dnssec-policy and the contents of the key state file? 
And if you have useful logs (grep for keymgr) that would be handy too to 
see what is going on.


If you prefer to share them off list, you can mail them me directly.

Best regards,

Matthijs

On 08-02-2022 18:00, Larry Rosenman wrote:

Greetings,
     new poster.  I just converted over to DNSSEC-policy,  and rolled my 
KSK.  I see:

key: 269 (RSASHA256), KSK
   published:  yes - since Sun Feb  6 14:31:32 2022
   key signing:    yes - since Sun Feb  6 14:31:32 2022

   No rollover scheduled
   - goal:   omnipresent
   - dnskey: omnipresent
   - ds: hidden
   - key rrsig:  omnipresent


ler in thebighonker in namedb on  master [!] as 慄
❯

Is it normal to see the ds as hidden?  It IS published, and I told rndc 
that.


Any insight appreciated.


--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


dnssec: ds showing hidden 3+ days after key roll

2022-02-08 Thread Larry Rosenman

Greetings,
new poster.  I just converted over to DNSSEC-policy,  and rolled my 
KSK.  I see:

key: 269 (RSASHA256), KSK
  published:  yes - since Sun Feb  6 14:31:32 2022
  key signing:yes - since Sun Feb  6 14:31:32 2022

  No rollover scheduled
  - goal:   omnipresent
  - dnskey: omnipresent
  - ds: hidden
  - key rrsig:  omnipresent


ler in thebighonker in namedb on  master [!] as 慄
❯

Is it normal to see the ds as hidden?  It IS published, and I told rndc 
that.


Any insight appreciated.

--
Larry Rosenman http://www.lerctr.org/~ler
Phone: +1 214-642-9640 E-Mail: l...@lerctr.org
US Mail: 5708 Sabbia Dr, Round Rock, TX 78665-2106
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users