Skip to content

Latest commit

 

History

History
109 lines (77 loc) · 5.39 KB

File metadata and controls

109 lines (77 loc) · 5.39 KB

Configure DNSSEC

In order to support DNSSEC in Traffic Router, Traffic Portal provides some actions for managing DNSSEC keys for a CDN and associated Delivery Services. DNSSEC keys consist of a KSK (Key Signing Key) which is used to sign other DNSKEY records as well as a ZSK (Zone Signing Keys) which is used to sign other records. DNSSEC keys are stored in Traffic Vault and should only be accessible to Traffic Ops. Other applications needing access to this data, such as Traffic Router, must use the to-api to retrieve this information.

tr-dnssec

Note

DNSSEC (DNS Security Extensions) is only supported for DNS-Routed <ds-types> Delivery Services.

Creating Keys

Note

In order for Traffic Ops to successfully store keys in Traffic Vault, at least one Traffic Vault server needs to be configured in Traffic Ops.

  1. Go to CDNs and click on the desired CDN.

    CDNs PageCDNs Page
  2. Click on More --> Manage DNSSEC Keys.

    CDN Details PageCDN Details Page
  3. Click on the Generate DNSSEC Keys button.

    DNSSEC Key Management PageDNSSEC Key Management Page
  4. A modal will pop up asking you to confirm that you want to proceed.

    Confirmation ModalConfirmation Modal
  5. Input the required information (reasonable defaults should be generated for you). When done, click on the green Generate button.

    Note

    Depending upon the number of Delivery Services in the CDN, generating DNSSEC keys may take several seconds.

    DNSSEC Key Generation PageDNSSEC Key Generation Page
  6. You will be prompted to confirm the changes by typing the name of the CDN into a text box. After doing so, click on the red Confirm button.

    DNSSEC Key Change ConfirmationDNSSEC Key Change Confirmation
  7. In order for DNSSEC (DNS Security Extensions) to work properly, the DS (Delegation of Signing) Record information needs to be added to the parent zone of the CDN's domain (e.g. If the CDN's domain is 'ciab.cdn.local' the parent zone is 'cdn.local'). If you control your parent zone you can enter this information yourself, otherwise you will need to work with your DNS team to get the DS (Delegation of Signing) Record added to the parent zone.

Enabling and Disabling DNSSEC on a CDN

  1. Once DS (Delegation of Signing) Record information has been added to the parent zone, DNSSEC needs to be activated for the CDN so that Traffic Router will sign responses. Go to the CDN details page for this CDN, and set the 'DNSSEC Enabled' field to 'true' (or 'false' to disable DNSSEC), then click the green Update button.

    Change 'DNSSEC Enabled' to 'true'Change 'DNSSEC Enabled' to 'true'
  2. DNSSEC (DNS Security Extensions) should now be active (or inactive, if disabled) on your CDN and Traffic Router should be signing responses. This should be tested e.g. with this dig(1) command: dig edge.cdn.local. +dnssec.

Regenerating KSKs

When KSK (Key-Signing Key) expiration is approaching (default 365 days), it is necessary to manually generate a new KSK (Key Signing Key) for the TLD (Top Level Domain) and add the DS (Delegation of Signing) Record to the parent zone. In order to avoid signing errors, it is suggested that an effective date is chosen which allows time for the DS (Delegation of Signing) Record to be added to the parent zone before the new KSK (Key-Signing Key) becomes active.

Regenerating Keys

It's also possible to re-do the generation of DNSSEC keys once they have already been generated. This can be done at any point after Creating Keys by clicking on the then-enabled Regenerate Keys button on the CDN's details page.