Agenda: dnssec-bind-manual-zsk-rollover.txt

File dnssec-bind-manual-zsk-rollover.txt, 5.3 KB (added by admin, 6 years ago)
Line 
1Manual Key Rollover Exercise
2----------------------------
3
4OBJECTIVE
5
6We are going to roll the ZSK for the zones we have just signed.
7
8PLEASE make note of the KSK/ZSK IDs and write them down on a piece of paper
9as you work to remember which is which.
10
11REMINDERS
12
13 - we are keeping our keys in /etc/namedb/keys/
14
15 - we currently have two pairs of keys in that directory, one ZSK and one KSK.
16   Each pair is represented by two files, one ending in ".key" (the
17   public key) and one ending in ".private" (the private key)
18
19 - there is a DS RRSet in the "root" zone corresponding to our KSK
20
21
22ZSK ROLLOVER
23
241. Take a look at what keys we have already generated. Make a note
25of the names of the files containing the current ZSK and KSK.
26
27  # cd /etc/namedb/keys/
28  # ls K*
29
302. Generate a new ZSK, which we will use to replace the old one.
31
32  # dnssec-keygen mytld    <---- replace mytld with the name of your zone
33
34Make sure all the keyfiles are readable by the named process:
35
36  # chown bind K*
37  # chmod u+r K*
38  # ls
39
40You should now have a third key pair in the directory. If you check the
41DNSKEY RDATA, you should see the flags field is 256 (i.e. this is a ZSK,
42not a KSK). Make a note of the name of the file containing the new ZSK.
43
443. Take a look at your current DNSKEY RRSet.
45
46  # dig mytld dnskey
47
48Your zone should contain one KSK and one ZSK (check the flags to
49distinguish between them).
50
51We need to add the new key to the zone, so it gets included in the next
52signing. At the end of the file "mytld", ADD the new key:
53
54        $include "/etc/namedb/keys/Kmytld.+005+45000.key";
55
56        Increment the serial number.
57
58        Save the file and exit
59
604. Re-sign your zone to get the new ZSK signed, but we will NOT sign using
61   the new ZSK - we only want the new ZSK to be signed by the current ZSK.
62   This is called a "pre publish".
63
64  # cd /etc/namedb/keys
65  # dnssec-signzone -o mytld -k Kmytld.+005+46516 ../master/mytld Kmytld.+005+36390
66
67  Notice in the above example that we are only using the current ZSK
68  to sign, not the new one - this is to make sure that dnssec-signzone
69  doesn't try to sign with both ZSKs. It wouldn't be "bad", but it would
70  mean twice the data in the zone!
71
72  So we tell dnssec-signzone exactly which keys to use when doing a
73  rollover, PRECISELY because you want to control the timing of when
74  a key is introduced, used to sign, and finally retired.
75
76  The output of the above command should be:
77
78Zone signing complete:
79Algorithm: RSASHA1: KSKs: 1 active, 0 stand-by, 0 revoked
80                    ZSKs: 1 active, 1 stand-by, 0 revoked
81mytld.signed
82
83  Notice the ZSKs: 1 active, 1 stand-by
84
855. See what difference this has made to the zone.
86
87  # rndc reload mytld
88  # dig mytld dnskey
89  # dig mytld dnskey +dnssec
90  # dig mytld soa +dnssec
91
92Your zone should now contain one KSK and two ZSKs; both ZSKs should be
93present in the DNSKEY RRSet, which should be signed by the KSK.
94
95BUT the SOA record (and other RRSets in the zone) should ONLY be signed once,
96using the old ZSK. And the DNSKEY RRset should show all 3 keys (1 KSK, 2 ZSKs).
97This is called "pre-signing".
98
99At this time, we should in principle wait 2 x TTL for both ZSKs to
100show up in everyone's cache (by default it is 120 seconds, or 2 minutes,
101in our lab, but this will be different "in real life"). Anyways, let's
102wait for at least 2 minutes before we sign with the new ZSK instead of the
103old ZSK.
104
105Once we are certain that "all the internet" (everyone in the class)
106can see both keys, we can sign with the new ZSK.
107
108Check the cache using dig!
109
1106. Sign with the new ZSK.
111
112   Remember, we have 3 keys - in our zone, we have:
113
114                $include "/etc/namedb/keys/Kmytld.+005+46516.key"; // KSK
115                $include "/etc/namedb/keys/Kmytld.+005+36390.key"; // ZSK we retire
116                $include "/etc/namedb/keys/Kmytld.+005+45000.key"; // new ZSK
117
118   Increment the serial number. Then:
119
120   # cd /etc/namedb/keys
121   # dnssec-signzone -o mytld -k Kmytld.+005+46516 ../master/mytld Kmytld.+005+45000
122
123... Notice how we now use 45000 (second ZSK) to sign, not 36390 anymore
124
125Now, reload the zone to propagage the changes
126
127   # rndc reload mytld
128
129Check with dig like in step 5 that you are seeing only ONE signature for your
130RRsets - which means we are only signing using ONE ZSK - you still have to
131wait for the TTL to expire before you can retire the old ZSK.
132
133
1347. Now you should notice, using dig like in step 5, that we are only
135   signing with one key
136
137   # dig www.mytld +dnssec
138
139But also verify that the OLD ZSK is still published in the DNSKEY RRset:
140
141   # dig mytld dnskey
142
143You should still see three keys.
144
1458. Retire the old ZSK.
146
147After waiting at least 2 minutes (120s), retire the old ZSK:
148
149  # cd /etc/namedb/master/
150
151  Edit the zone file and add a comment sign (';') in front of the old ZSK
152  (double check which key!)
153
154$include "/etc/namedb/keys/Kmytld.+005+46516.key";      // KSK
155;$include "/etc/namedb/keys/Kmytld.+005+36390.key";     // ZSK (commented out)
156$include "/etc/namedb/keys/Kmytld.+005+45000.key";  // new ZSK
157
158  Increment the serial number.
159
160  Now resign the zone, but you will notice that we explicitly DON'T specify
161  the ZSK we just commented:
162
163  # cd /etc/namedb/keys
164  # dnssec-signzone -o mytld -k Kmytld.+005+46516 ../master/mytld Kmytld.+005+45000
165  # rndc reload mytld
166  # tail /etc/namedb/log/general
167
1689. Like in the step 5, check that signatures still work, and that
169   the OLD KZK is no longer in the RRset
170
171   Does your domain still work ? :)
172