Root has been signed as of July 2010 ("Layer 9 issue") so only need one trust anchor in your configuration
As of 2016 DNSSEC deployment is much easier.
"Everyone has their own NS provisioning scripts" Good news: don't have to change these scripts for DNSSEC deployment. "Bump in the wire signing" avoids having to futz with local provisioning scripts.
Tip: Make sure NTP is correctly configured - DNSSEC is very time dependent.
A lot of people converted to dynamic zones to make DNSSEC easier
Two keys per zone, Zone Signing Key and Key Signing Key. ZSK gets changed every quarter or whatever. KSK has to get parent permission to change and probably never changes.
"The Root KSK will be rolled! Use managed-keys!"
"dig +multi" to see more info on keys
https://deepthought.isc.org/article/AA-00610/0/Can-I-extract-the-key-tag-from-a-DNSKEY-obtained-via-dig.html
dnsviz.net "is your friend"
Useful tool to maintain dnssec access for your client:
https://www.nlnetlabs.nl/projects/dnssec-trigger/
https://www.nanog.org/sites/default/files/Winstead_DNSSEC%20Tutorial.pdf
DS Resource Records - Talking to our Parent...To create chains of trust "in-protocol," the Key Signing Key of a zone ishashed and that hash is placed into the parentThis record is known as the Delegation Signing (DS) recordThe DS record in the parent creates a secure linkage that an externalattacker would have to overcome to forge keying material in the child
Preparing for DNSSEC DeploymentThere are a number of methods of deploying DNSSEC into existing zones:Manual zone signing (In 2016, DDT - Don’t Do That!)Automatic zone signing of dynamic zonesAutomatic in-line signing "on-box"Automatic in-line signing "bump-in-the-wire"
Automatic Zone Signing of Dynamic ZonesBIND 9.7 and newer provide automation of zone signing of dynamic zonesKeying material contains timing "meta-data" that can allow automation ofkey rolloverMaking a zone dynamic is significantly easier in recent versions of BINDDynamic zones are not always appropriate or allowed
Active Directory Dynamic DNS --Automatic In-Line SigningBIND 9.9 introduced In-Line signingSigning of zones without knowledge of / changes to existing processesand proceduresOn-Box in-line signing DNSSEC signs zones in memory on the samesystem on which they are masteredBump In The Wire signing provides signing on an intermediate systemUse this where existing infrastructure can't be modified
In this list can do the first four elements to get experience without going live. When DS in the parent zone then that's when it all goes live.
DNSSEC Signing - The Short ListGenerate keys for zoneInsert public portions of keys Into zoneSign zone with appropriate keysPublish signed zoneDS in the parent zoneValidate!
No comments:
Post a Comment