Hi Libor,
sorry for taking so long to come back to you, but we tried our best to trace down our
previous steps to make this issue reproducible.
We found out, that the described behavior does not affect all of the domains that we
wanted to sign. We made this assumption based on a small set of domains that we used to
test real-world DNSSEC integration with and that we frequently enabled and disabled
signing for over and over again, while we were figuring out how we can use knot.
To clarify this point: New domains, that have not been signed previously are not affected
by this!
The steps to reproduce the described problem are:
1. Set up a knot 2.7.6 using a config without (!) a submission section
2. Add an unsigned zone to the config file and reload knot
3. Set the template of the zone to "signed" and reload knot
4. Execute "knotc zone-status" for the domain, and you should be able to
observe the following state: "parent DS query: not scheduled"
5. Set the template of the zone to make it unsigned again and reload knot
6. Add the submission section to the knot.conf and reload knot
7. Set the template of the zone to "signed" and reload knot
8. Execute "knotc zone-status" for the domain, and you should be able to still
observe the following state: "parent DS query: not scheduled"
This seems to indicate that there is some persistent state, that remains for the zones
that have been removed from the signed template, and that this state actually prevents the
parent DS query from being scheduled (ever?) again.
I hope that this description gives you enough insight to evaluate the behavior.
Best regards,
Thomas
Am 06.03.19 um 18:03 schrieb libor.peltan:
Hi Thomas,
I'm still not sure what goes wrong in your case. The setup looks good and when I try
something similar, it works for me - the DS check is planned whenever I add a zone to
"signed" policy.
Could you please send us the logs of Knot? (Also shuffle with the configured log
verbosity first, e.g. like:
log:
- target: "stdout"
any: "info"
). Thanks much!
Libor
Dne 06.03.19 v 16:47 Daniel Salzman napsal(a):
> Hi,
>
> On 3/5/19 10:14 PM, Thomas wrote:
>> Hi Daniel,
>>
>> we add the new zones configured with the "default" template. When a
>> customer is requesting DNSSEC we move the zone to the "signed"
template.
>>
>> Could that be the problem?
>>
> It shouldn't be. But as you use shared key, it's possible there is a bug in
the code.
> We will investigate your setup...
>
> Daniel
>
>> Best regards,
>> Thomas
>>
>> On 05.03.19 19:32, daniel.salzman(a)nic.cz wrote:
>>> Hello Thomas,
>>>
>>> On 2019-03-05 18:31, Thomas E. wrote:
>>>> Hello Daniel,
>>>>
>>>> we tried the described approach, and it worked fine for zones, that we
>>>> already executed "knotc zone-ksk-submitted xx.tld" for.
>>>>
>>>> For freshly added zones however the "knotc zone-status xx.tld"
returns
>>>> a status that indicates that the parent DS query has not been
>>>> scheduled:
>>>>
>>> Are the freshly added zones configured with template 'signed'?
>>>
>>> Daniel
>>>
>>>> [xx.tld.] role: master | serial: 1551549547 | transaction: none |
>>>> freeze: no | load: not scheduled | refresh: not scheduled | update:
>>>> not scheduled | expiration: not scheduled | journal flush: not
>>>> scheduled | notify: not scheduled | DNSSEC re-sign: +19h26m42s | NSEC3
>>>> resalt: +27D2h42m39s | parent DS query: not scheduled
>>>>
>>>> Also our logs do not show any attempts of parent DS queries for the
>>>> affected zone, only for the zones that we previously executed
>>>> "zone-ksk-submitted" for.
>>>>
>>>> Right now we add the zone using a default template (which does not
>>>> make use of DNSSEC), because not all of our zones should be signed
>>>> right away and switch the template to a signed template for specific
>>>> zones, that we actually want to sign.
>>>>
>>>> Here's an excerpt from our current config:
>>>>
>>>> remote:
>>>> - id: local-resolver
>>>> address: 192.168.1.2
>>>>
>>>> submission:
>>>> - id: resolver
>>>> parent: local-resolver
>>>>
>>>> policy:
>>>> - id: shared
>>>> algorithm: RSASHA256
>>>> ksk-size: 2048
>>>> zsk-size: 1024
>>>> zsk-lifetime: 1d
>>>> ksk-lifetime: 2d
>>>> ksk-shared: true
>>>> ksk-submission: resolver
>>>> nsec3: true
>>>>
>>>> template:
>>>> - id: default
>>>> storage: "/var/lib/knot"
>>>> semantic-checks: on
>>>> global-module: mod-stats
>>>> master: primary
>>>> notify: secondaries
>>>> acl: [primary, secondaries]
>>>>
>>>> - id: signed
>>>> dnssec-signing: on
>>>> dnssec-policy: shared
>>>> acl: [primary, secondaries]
>>>> notify: secondaries
>>>>
>>>>
>>>> Maybe we get something fundamentally wrong, but from our experience
>>>> there is no DS scheduling without an initial manual intervention via
>>>> "knotc zone-ksk-submitted xx.tld".
>>>>
>>>> Any hint would be appreciated!
>>>>
>>>> Thank a lot,
>>>> Thomas
>>>>
>>>>
>>>>
>>>>
>>>> Am 05.03.19 um 11:49 schrieb Daniel Stirnimann:
>>>>> Hello Thomas,
>>>>>
>>>>> On 05.03.19 11:24, Thomas E. wrote:
>>>>>> Will the "knotc zone-ksk-submitted" command still be
necessary for the
>>>>>> initial DS lookup when signing a new zone? Or is the
"ksk-submission"
>>>>>> statement sufficient in any case?
>>>>> The use of "ksk-submission" is sufficient.
>>>>>
>>>>> From the knot documentation:
>>>>> "At this point new KSK has to be submitted to the parent zone.
Knot
>>>>> detects the updated parent’s DS record automatically (and waits for
>>>>> additional period of the DS’s TTL before retiring the old key) if
parent
>>>>> DS check is configured, otherwise the operator must confirm it
manually
>>>>> with knotc zone-ksk-submitted"
>>>>>
https://www.knot-dns.cz/docs/2.7/singlehtml/
>>>>>
>>>>> I've never used "knotc zone-ksk-submitted". Maybe
it's useful if you
>>>>> have a broken trust chain to your zone and in some scenario you
might
>>>>> want to tell knot to go ahead...
>>>>>
>>>>> Daniel
>>>>>