9.6.2-P1 has worked ok for me [so far]. Two ideas that might yield more
info for us to look at (increase v level as needed, but start with 1):
named-checkzone xxx.xxx.gov.au db.xxx.xxx.gov.au
dnssec-signzone -g -v 1 -o xxx.xxx.gov.au db.xxx.xxx.gov.au
Nate Itkin
Is there a key signing key (KSK) in the zone file? db.xxx.xxx.xxx.au should
have an entry something like this:
$include Kxxx.xxx.xxx.au.+007+12345.key ; KSK
Does that file (Kxxx.xxx.xxx.au.+007+12345.key) and its corresponding
private key (Kxxx.xxx.xxx.au.+007+12345.private) exist with read permission on?
Also, how are you specifying which key is the KSK (typically the -k option
with dnssec-signzone)?
I can replicate your symptoms and the error message by removing the KSK from
a zone file.
Nate Itkin
When dnssec-signzone has finished signing, it checks the zone for validity.
In this case, it found that the DNSKEY RRset didn't have any signatures
from a key-signing key. This may be due to such a key not existing, or
its private file being inaccessible.
Older versions of dnssec-signzone didn't check for this; that's why
it never appeared to be a problem until now.
Note that sometimes it *isn't* a problem--for example, when you're
signing a zone in two phases, once with a ZSK and later with a KSK. If
that's what's going on in your case, add the -P flag (for "partial") to
dnssec-signzone; that will suppress the validity check.
--
Evan Hunt -- ea...@isc.org
Internet Systems Consortium, Inc.