Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check for signed zone with no signatures from above #6

Open
mrimann opened this issue Jun 7, 2017 · 3 comments
Open

Check for signed zone with no signatures from above #6

mrimann opened this issue Jun 7, 2017 · 3 comments

Comments

@mrimann
Copy link
Owner

mrimann commented Jun 7, 2017

If you eg. configure a Domain to be DNSSEC signed on your nameservers, but don't have the keys defined in the domain registry (either not yet, or they got removed), then the script currently says something like

WARNING: Zone foobar.tld seems to be unsigned (= resolvable, but no DNSSEC involved at all)

Which is not completely correct, because DNSSEC is involved, but not from top down, but only in the DNS zone itself.

Goal of this task would be to differentiate those two scenarios better:

  • no keys/signatures in the registry + zone not signed on the nameserver (= show the same message as now)
  • no keys/signatures in the registry + zone is signed (= show different message)
@mrimann
Copy link
Owner Author

mrimann commented Sep 27, 2017

@gryphius Any comments on this one?

@gryphius
Copy link
Contributor

"no keys/signatures in the registry + zone is signed" is called an "island of security". This is pretty common. People want to test signing their zones first without causing any problems if something in the signing process goes wrong. Resolvers can validate these zones with locally configured trust anchors only.

I'd suggest you check for both DNSKEY and DS records and...

  • DNSKEY and DS : zone is signed and we can validate top down from the root
  • DNSKEY but no DS: island of security, script can not validate the zone unless a local trust anchor is configured in the validating resolver. But you can still check RRSIG expiration times etc (which was the original idea of this script iirc)
  • DS but no DNSKEY: validation failure, all validating resolvers will treat this as BOGUS
  • neither DS nor DNSKEY: FeelsBadMan

@gryphius
Copy link
Contributor

also, it should configurable per zone if the zone is supposed to be an island of security or not.
in case the DS gets removed without the zone administrators knowledge (because someone from marketing with access to the registrar GUI screwed up ;-) ) we want to be alerted, but when our zone is in testing mode and we deliberately don't have a DS in the parent then all is good.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants