Created: 2023-10-19 Thu 13:47
master and slave have been used to describe primary
and secondary authoritative DNS servers in the past.
primary (instead of master) and secondary (instead
of slave) whenever possible.
% rndc nta -l 60 fail01.dnssec.works Negative trust anchor added: fail01.dnssec.works/_default, expires 18-Aug-2016 13:52:19.000 % rndc nta -dump fail01.dnssec.works: expired 18-Aug-2016 13:52:19.000 % ls -l /var/named/_default.nta -rw-r--r--. 1 root root 44 Aug 18 13:51 /var/named/_default.nta % cat /var/named/_default.nta fail01.dnssec.works. regular 20160818115219
% rndc nta -l 86400 fail02.dnssec.works # add a NTA for 1 day Negative trust anchor added: fail02.dnssec.works/_default, expires 19-Aug-2016 13:56:22.000 % rndc nta -dump fail02.dnssec.works: expiry 19-Aug-2016 13:56:22.000 % rndc nta -r fail02.dnssec.works # remove the NTA Negative trust anchor removed: fail02.dnssec.works/_default % rndc nta -dump # NTA is now gone
$ ldns-walk isc.org
NSEC3PARAM record. This
record holds information needed by authoritative DNS servers to
generate NSEC3 records for negative answers
nsec3.dnslab.org. 0 IN NSEC3PARAM 1 0 20 ABBACAFE
0 (meaning 1 iteration of
SHA1 hashing)
-1 0 0 - (SHA1 Hash,
no flags, 1 iteration, no salt)dnssec-cds utility can change DS records for a child zone
based on CDS/CDNSKEY records
SERVFAIL to the DNS client whenever it detects a mismatch in
the DNSSEC chain of trust or a bogus or expired DNSSEC signature
SERVFAIL is not DNSSEC specific, there are many error
situations that can result in an SERVFAIL response
because of DNSSEC security and will blame the operator of the DNS resolver for the outage
authoritative server due to CPU resource exhaustion
(Refresh/Retry/Expire/NegTTL). Too large values can be problematic.
unbound-host) before submitting to the operator of the
parent zone
| Algorithm | No. | Note |
|---|---|---|
| 1 | deprecated, not implemented | |
| 5 | not recommend, deprectated for DNSSEC signing, not supported in Red Hat Enterprise Linux 9 (and up) | |
| RSASHA256 | 8 | recommended |
| RSASHA512 | 10 | large keys, large signatures, risk of UDP fragmentation or TCP fallback |
| 3 | deprecated, slow validation, no extra security | |
| 12 | deprecated | |
| ECDSA | 13/14 | small signatures, read RSA vs ECDSA for DNSSEC |
| ED448/ED25519 | 16/15 | not supported by legacy resolver RFC 8080 / RFC 8032 Edwards-Curve Digital Signature Algorithm (EdDSA) / Assessing DNSSEC with EdDSA |
Questions?