[Opendnssec-user] Zone signed but with old expiration dates?
Stephane Bortzmeyer
bortzmeyer at nic.fr
Mon Jul 9 10:39:20 UTC 2012
We discovered today that our zone's DNSKEY signature
expired. OpenDNSSEC created the last version on 5th july (and reloaded
the DNS master, a BIND):
% find . -type f |xargs ls -l
-rw-r--r-- 1 root root 24576 Jul 9 11:47 ./db/kasp.db
-rw-r--r-- 1 root root 24576 Apr 10 14:36 ./db/kasp.db.backup
-rw-r--r-- 1 root root 0 Jul 9 11:47 ./db/kasp.db.our_lock
-rw-r--r-- 1 root root 1119 Jul 2 15:47 ./signconf/rd.nic.fr.xml
-rw-r--r-- 1 root root 1119 Jul 2 00:46 ./signconf/rd.nic.fr.xml.OLD
-rw-r--r-- 1 opendnssec opendnssec 29378 Jul 5 11:47 ./signed/rd.nic.fr
-rw-r--r-- 1 root root 29133 Jun 15 11:06 ./signed/rd.nic.fr-orig
-rw-r--r-- 1 opendnssec opendnssec 32601 Jul 5 13:47 ./tmp/rd.nic.fr.backup
-rw-r--r-- 1 opendnssec opendnssec 4001 Jul 2 00:46 ./tmp/rd.nic.fr.inbound
But signed/rd.nic.fr contains signatures which work from 1st July to
9th July:
rd.nic.fr. 3600 IN DNSKEY 256 3 8 AwEAAbKFODstxs+c4yBhRTaMXPFxe/CcCm9Yv7m4v6nC+z/QnK7SpCVcpUNplihimV8giDvNez
80ZrsJLNOhOUmfyhNm0FkaZEx0AzZy0Iftf7DwqKpqWY5vwtRqOYaE0rfjTI93AOQxO6X+ktcuvA2sS92GxEz4wG24My7JErAjYl41 ;{id = 61800 (zsk),
size = 1024b}
rd.nic.fr. 3600 IN DNSKEY 256 3 8 AwEAAb3wf51lBc8U8a8oCv0VbX9HsvsgpwnoxpBld5GwSnmdPx88qZ5fvNaOsiW1gmyQMNUXoI
xBnxWG4/nEWmfdOr9R2BChZymLx1qCp6JDYsq7XO+MCRLiWpfwXy1YfylJOCo9laIbTztJF5H2cLuIazWXfTZsmhmtbjzqIs2gm7ej ;{id = 29214 (zsk),
size = 1024b}
rd.nic.fr. 3600 IN DNSKEY 257 3 8 AwEAAfDCm6XxMotTfpBpaCWJNovM+vDNd+ma47WjHjFj2vZ5RHhi0ocuOURGuin2ZwUqcb5dqd
mSKYn8PZYk27BdMA0jipZBfmLokmjvo8Eg38zuxv/g93b/h9YZSAmoauZFZ3AS2YsFuJY1syjIPUb/PFbbkktroyzNVCfveHRCseZCz94QPFt3OJKQM9lbg9NY
n7AT3it9RroRO9gZRYe4ekMOZaFGvDy7fHvtScHOq2ClYgblHDLUt4Ys7IHWqstssFtksGVUGqaavKH5OGF2h7evIxweke9PR8QrheO5rV79XqXFR6YZVuydk/
QdZcEd09+xsK7ScGA/uGVcF9deRhE= ;{id = 10555 (ksk), size = 2048b}
rd.nic.fr. 3600 IN RRSIG DNSKEY 8 3 3600 20120709043743 20120701214659 10555 rd.nic.fr. tWNggM40zMrFc3cHgMD
HmgDhHA8XQUQG6h4Jv1JiAeQy+dTdYmU5gF6tvTO97QlWo1NUXfTWfez/okjei9XC+Qpvhm1QoRUBFPEB6wcTjRhNZ3hEldojJHBerdu1INHy3XQse7u22dGOG
1luoV6x8Tprkync/9Yx2IlMAXTXB2Sa/cdJJjSb6AlKthYdSzt0/dADU0mfX8sD4War/qR6b/b/Lyip0Nd4pzDQ+vEM627EGofv57yt6QjR1cqAFQD1bginXFK
g5qulHTAnloi0qBq+fisD7FJ2G78fwL/QfwgzeHn+f9hMlEYPFDQy6qUXkwmyUq+XZ6NHXC/0dbLv2w==
Same problem for the NSEC3PARAM. But the NS rrset signature is
correct, going from 4th to 12th july:
rd.nic.fr. 3600 IN NS ns1.rd.nic.fr.
rd.nic.fr. 3600 IN NS ns3.nic.fr.
rd.nic.fr. 3600 IN RRSIG NS 8 3 3600 20120712004919 20120704224701 29214 rd.nic.fr. RTkNMogF7jb37mhBcGSqlcc
dzNna/jwAa6R7puMesCJUoWefk4j+RqC4c6M6QZAreMvGNoNFfCCN0tIpZQtbNgGnGneq4F1UdW6qIjUqfCHZabbp6je+QftpI5XzXz6Blo5RvUqyd2M0Rahf+
X14D12P1RpSG9sNaZmf/hpvSoo=
Even funnier, one A record has a proper inception/expiration but not
the AAAA:
adia.rd.nic.fr. 3600 IN A 192.134.7.132
adia.rd.nic.fr. 3600 IN RRSIG A 8 4 3600 20120712020917 20120705044701 29214 rd.nic.fr. X1jFEDOmeujxTDaMoCfBOiyD
nFZqrPSHDvf0iaqEG5LfCi0Ldb+p5q9mpQcknin4ZeFkbefz0YsMht1ZQfgYBhZUuuS2IgodyyY6RnUzhtJjTgvglv09pwDMl3vZHusNoYCWipMwphiUxFz63+
2jR7+kFjhAA699Ji/4pGEuuKY=
adia.rd.nic.fr. 3600 IN AAAA 2001:660:3003:6::7:132
adia.rd.nic.fr. 3600 IN RRSIG AAAA 8 4 3600 20120708132308 20120701060835 61800 rd.nic.fr. sXXzADzgL8ahAmPWTb8Di
+zkftSK9udTyn0e7kA2N3lXsknE5Al9sDis4zaE6WO50KPdFgXE4TwXf78EnbXJJQ7Nf0MMdjeZtCrqVjTFsLMBfhxagiooYSMGvo4d3jK22QqyJGS3Q0qcN8B
yCp9RdST6J/E8FYAgZ1RGnOUS680=
Any idea of what went wrong?
Debian "stable", OpenDNSSEC from the backports, version 1.3.2 (Debian
1.3.2-1~bpo60+1), using SoftHSM.
Default policy used:
<Policy name="default">
<Description>A default policy that will amaze you and your friends</Description>
<Signatures>
<Resign>PT2H</Resign>
<Refresh>P3D</Refresh>
<Validity>
<Default>P7D</Default>
<Denial>P7D</Denial>
</Validity>
<Jitter>PT12H</Jitter>
<InceptionOffset>PT3600S</InceptionOffset>
</Signatures>
<Denial>
<NSEC3>
<!-- <OptOut/> -->
<Resalt>P100D</Resalt>
<Hash>
<Algorithm>1</Algorithm>
<Iterations>5</Iterations>
<Salt length="8"/>
</Hash>
</NSEC3>
</Denial>
<Keys>
<!-- Parameters for both KSK and ZSK -->
<TTL>PT3600S</TTL>
<RetireSafety>PT3600S</RetireSafety>
<PublishSafety>PT3600S</PublishSafety>
<!-- <ShareKeys/> -->
<Purge>P14D</Purge>
<!-- Parameters for KSK only -->
<KSK>
<Algorithm length="2048">8</Algorithm>
<Lifetime>P1Y</Lifetime>
<Repository>SoftHSM</Repository>
</KSK>
<!-- Parameters for ZSK only -->
<ZSK>
<Algorithm length="1024">8</Algorithm>
<Lifetime>P30D</Lifetime>
<Repository>SoftHSM</Repository>
<!-- <ManualRollover/> -->
</ZSK>
</Keys>
More information about the Opendnssec-user
mailing list