Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

DNSSEC migration sanity check

16 views
Skip to first unread message

John W. Blue

unread,
Aug 19, 2020, 2:44:40 PM8/19/20
to bind-...@lists.isc.org

We are in the process of moving from one IPAM vendor to another.

 

All of our zones are DNSSEC signed and the TTL’s have been lowered to 300 seconds.

 

At a high level, the playbook is to update the registrar with names/IP addresses of the new servers and update the DSKEY.  Depending on the time of the day that the cutover actually happens at we know the process to request of the registrar an out of band data push so the new servers will be seen by the open Internet.

 

A suggestion have been put forth that we should unsign our zones prior to migration but I am skeptical of the benefits of doing so.

 

Are we missing something obvious?

 

John

Crist Clark

unread,
Aug 20, 2020, 12:49:54 AM8/20/20
to John W. Blue, bind-...@lists.isc.org
Not sure I understand why you need to do anything except change the
authoritative NS records in the zone and in the delegation at the
registrar. You also only really need to decrease the TTL on the NS
records, not all of the records in the zone. Why touch any keys and
the corresponding DS records?

Are we missing some complication in your deployment?
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list
>
> ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.
>
>
> bind-users mailing list
> bind-...@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

Matthijs Mekking

unread,
Aug 20, 2020, 4:25:31 AM8/20/20
to bind-...@lists.isc.org
Hi John,

It all depends on the key material that is used to sign your zone. It
looks like you have to update the DNSKEY RRset, so I assume the vendors
are responsible for signing and each have their own key material.

In order to let the world know you are going to use new keys you will
have to pre-publish them in your zone. The DNSKEY RRset should be the
same in both versions of the zone . Also introduce the new NS records in
the child zone at the losing vendor.

Approximately one TTL (300 seconds in your case) later the new DNSKEY
RRset should be propagated and you can swap the DS and NS at the parent.
And when the DS and NS records of the one vendor have expired you can
remove the old key material from the zone.

For a bit more background on this you can take a look at
https://tools.ietf.org/html/rfc6781#section-4.3.5

In most cases there is no need to go insecure. The RFC section I refer
to have some considerations why you might want to go insecure during the
transition.

Hope this helps,

- Matthijs
signature.asc
0 new messages