1

My attempt to DNSSEC has not been successful. To help understand DNSSEC I have read many online articles, man pages for rndc, dnssec-*, viewed dnsviz.net and dnssec-analyzer.verisignlabs.com/. Most of the information explains DNSSEC in great detail but I need to know WHAT to do and how to FIX the problems.

For example, dnsviz.net/allenintech.com indicates, "no valid DNSKEY records are provided by the authoritative name server to match the DS record published by the TLD name server".

HOW is a DNSKEY record provided by the NS to match the DS record published by the TLD? Is there a configuration I am missing? Are there rndc or dnssec-* commands to accomplish this?

System Ubuntu 20.04 BIND 9.16.1-Ubuntu (Stable Release) Apache/2.4.48 (Ubuntu)

named.conf Zone Files To trouble shoot the problems all except a few zones were retained. I thought reducing the zones would better help diagnose and fix the problems.

Notice Two views: inside and outside IP Local Server: 10.0.0.1 (inside view) Static IP Server: 99.93.25.17 (outside view) Secondary NS: 51.38.99.90

options{
        directory "/etc/bind/zoneFiles/";
    listen-on port 53 { 127.0.0.1; 10.0.0.1; 99.93.25.17; };
    allow-transfer { none; };
    dnssec-policy default;
    bindkeys-file "/etc/bind/zoneFiles/bind.keys";

};

acl "mylo" { 127.0.0.1; }; acl "mylan" { 10.0.0.0/24; }; acl "mywireless" { 192.168.1.0/24; }; view inside { match-clients {"mylan"; "mylo"; "mywireless";}; recursion yes;

    zone "." {
            type hint;
            file "/etc/bind/zoneFiles/root.hints";
    };
    zone "allenintech.com" {                                                         
            type master;  
            file        "/etc/bind/zoneFiles/insideView/allenintech.com.inside/db.allenintech.com.inside";
            key-directory "/etc/bind/zoneFiles/insideView/allenintech.com.inside";   
            allow-transfer {51.38.99.90;};                                           
    };                                                                               

};
view outside {

    recursion no;
    match-clients {any;};
    allow-query {any;};
    #--------------------------------------------------
    zone "."  {
            type hint;
            file "/etc/bind/zoneFiles/root.hints";
    };

    zone "allenintech.com" {
            type master;
            file          "/etc/bind/zoneFiles/outsideView/allenintech.com.outside/db.allenintech.com.outside";
            key-directory "/etc/bind/zoneFiles/outsideView/allenintech.com.outside";
            allow-transfer {51.38.99.90;};
    };

};

Inside View

$ORIGIN **allenintech.com.**
$TTL      86400
@       IN      SOA ns2.allenintech.com. besus.allenintech.com. (
                        2022030750  ; Serial
                        28800       ; Refresh
                        120         ; Retry
                        1209600     ; Expire
                        86400       ; Minumum
)

; Name servers @ IN NS ns2.allenintech.com. ns2 IN A 10.0.0.1

; Web Services
www IN A 10.0.0.1 @ IN A 10.0.0.1

Outside View

$ORIGIN **allenintech.com.**
$TTL      86400
@       IN      SOA ns1.allenintech.com. besus.allenintech.com. (
                        2022030725  ; Serial
                        28800       ; Refresh
                        120         ; Retry
                        1209600     ; Expire
                        86400       ; Minumum
)

; Name Servers @ IN NS ns1.allenintech.com. ; primary ns1 IN A 99.93.25.17 ; primary

                    NS fns2.42.pl.          ; secondary


; Web Services
www IN A 99.93.25.17 @ IN A 99.93.25.17

**Current Images

DNSVIZ

DNSSECANALYZER

Old images dnsviz dnssec-analyzer.verisignlab

Old Images https://dnssec-analyzer.verisignlabs.com/allenintech.com

dnsviz.net/allenintech.com

Anthon
  • 11
  • isnt Insideview an admin panel? please share the zonefile – djdomi Mar 17 '22 at 17:52
  • insideview is not an "admin panel". Yes, I will post the zonefile. However, before posting the zonefile, I need to edit the post to update the two images: https://dnssec-analyzer.versignlabs.com/allenintech.com and https://disviz.net/allenintech.com – Anthon Mar 17 '22 at 18:16

2 Answers2

1

There is a mismatch between the DNSSEC keys used to sign the zone (13/61524) and the DS records signed by the parent zone (com. has 13/51277). Please update your DS records at your registar.

The dnssec-signzone command should have created a file named dsset-allenintech.com containing the correct DS records:

allenintech.com.    IN DS 61524 13 1 ****************************************
allenintech.com.    IN DS 61524 13 2 ******************************************************** ********
Esa Jokinen
  • 49,773
  • (A) Are these the correct steps to implement your, (i.e. Esa Jokinem's), suggestion to “Update your DS record at your registrar”?

    I am using the ARM for 9.16.1 at https://downloads.isc.org/isc/bind9/9.16.1/doc/arm/Bv9ARM.ch04.html#generating_dnssec_keys to implement the suggestion. Go to (B)

    – Anthon Mar 20 '22 at 18:34
  • (B)
    1. Zone Signing Key (ZSK)
    • cd to key-directory
    • rm .key .private .jnl .state
    • cp fresh zone configuration file to key-directory
    • dnssec-keygen -a ECDSAP256SHA256 -n ZONE allenintech.com
    • output

    Similar to the following:

    • Kallenintech.com.+013+12345.key and Kallenintech.com.+013+12345.private.
    • allenintech.com zone is updated with DNSSEC records. Go to (C)
    – Anthon Mar 20 '22 at 18:34
  • (C) 2) Register update DS record
    1. Key Signing Key (KSK)
    • After the DS record has been updated by the registrar
    • Note: Key signing is automatic with option: “dnssec-policy default”
    • rndc reload
    • output
    • Two output files similar to the following will be produced: Kallenintech.com

    +013+12345.key and Kallenintech.com.+013+12345.private, maybe as well as *.state, as well as allenintech.com.signed, keyset and dsset. Thanks!

    – Anthon Mar 20 '22 at 18:35
  • What is the best way to enable DNSSEC with BIND with automatic signing? I need assistance, please.

    I am using the ARM for 9.16.1 at https://downloads.isc.org/isc/bind9/9.16.1/doc/arm/Bv9ARM.ch04.html#generating_dnssec_keys

    to implement the suggestion: “Update your DS record at your registrar” as suggested by @Esa Jokinen

    – Anthon Mar 24 '22 at 00:41
  • What is/are the command(s) to generated the DS record to be updated at the registrar? Specificity would be appreciated. @Esa Jokinen
  • – Anthon Mar 24 '22 at 00:42
  • In regards to the DS record, where are the DS data located? Are the DS data located in a file and/or are there command(s) to see/view the DS data to be sent to the registrar? @Esa Jokinen
  • – Anthon Mar 24 '22 at 00:42
  • In named.com, dnssec-policy is set to “default”. So according to ARM 9.16.1, automatic signing is enabled. What are the steps and commands to implement automatic signing? Is the dnssec-signzone command necessary when dnssec-policy is default? Will dsset-allenintech.com be produced without issuing sign-zone command? @Esa Jokinen
  • – Anthon Mar 24 '22 at 00:43