[Pdns-users] How to specify *default* ZSK/KSK auto-signing algorithms in auto-provisioned, pdns superslave?

PGNet Dev pgnet.dev at gmail.com
Tue Jan 3 04:02:47 UTC 2017


I'm running pdns 4.0.1-264-g50e4ab3

It's configured as an auto-provisioned superslave to a bind9 supermaster.

After NOTIFY of a new zone to pdns from the master, the zone's created & signed:

	pdnsutil show-zone example.com
		Jan 02 19:28:46 Reading random entropy from '/dev/urandom'
		This is a Slave zone
		Master: 10.1.1.53
		Last time we got update from master: Mon 2017-01-02 19:26:48
		SOA serial in database: 1482864727
		Refresh interval: 7200 seconds
		Zone has following allowed TSIG key(s): pdns-key
		Zone uses following TSIG key(s): pdns-key
		Metadata items:
		        ALLOW-AXFR-FROM 10.1.1.53
		        ALLOW-AXFR-FROM 10.2.2.53
		        ALLOW-DNSUPDATE-FROM    10.1.1.53
		        AXFR-MASTER-TSIG        pdns-key
		        AXFR-SOURCE     10.1.1.53
		        IXFR    1
		        SOA-EDIT-DNSUPDATE      EPOCH
		        TSIG-ALLOW-AXFR pdns-key
		        TSIG-ALLOW-DNSUPDATE    pdns-key
		Zone is presigned
		Zone has hashed NSEC3 semantics, configuration: 1 0 5 84d74180
		keys:
		KSK, tag = 39060, algo = 14, bits = 384
		DNSKEY = example.com. IN DNSKEY 257 3 14 sgA...ceE; ( ECDSAP384SHA384 )
		DS = example.com. IN DS 39060 14 1 acd...44f ; ( SHA1 digest )
		DS = example.com. IN DS 39060 14 2 e01...ec1 ; ( SHA256 digest )
		DS = example.com. IN DS 39060 14 4 e94...d79 ; ( SHA-384 digest )
		ZSK, tag = 1013, algo = 14, bits = 384
		DNSKEY = example.com. IN DNSKEY 256 3 14 RP6...sfx; ( ECDSAP384SHA384 )

Note that the KSK/ZSK are using algo = 14,

		KSK, tag = 39060, algo = 14, bits = 384
		ZSK, tag = 1013, algo = 14, bits = 384

which *is* clearly one of the supported algos,

	pdnsutil list-algorithms
		Jan 02 19:34:19 Reading random entropy from '/dev/urandom'
		DNSKEY algorithms supported by this installation of PowerDNS:
		5 - RSASHA1
		7 - RSASHA1-NSEC3-SHA1
		8 - RSASHA256
		10 - RSASHA512
		13 - ECDSAP256SHA256
		14 - ECDSAP384SHA384

but, according to

	https://doc.powerdns.com/md/authoritative/dnssec/#dnssec-defaults

is not supposed to be the default: "algorithm 13, ECDSAP256SHA256",

	DNSSEC Defaults

		Since version 4.0, when securing a zone using pdnsutil secure-zone, a single ECDSA (algorithm 13, ECDSAP256SHA256) key is generated that is used as ZSK. Before 4.0, 3 RSA (algorithm 8) keys were generated, one as the KSK and two ZSKs. As all keys are online in the database, it made no sense to have this split-key setup.

, at least when directly using

	pdnsutil secure-zone

In my pdns.conf I've config'd

	...
	default-ksk-algorithms=ecdsa256
	default-ksk-size=0
	default-zsk-algorithms=ecdsa256
	default-zsk-size=0
	...

which apparently isn't sufficient.

Where/how do I specify the KSK/ZSK algos to be used in this superslave config (not using `pdnsutil secure-zone` on the cmd line)? whether globally, or in per-domain metadata?



More information about the Pdns-users mailing list