Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 5.3

Table of Contents

Something is wrong with, what to do?


Code Block
$ ls -al /var/lib/opendnssec/unsigned/
-rw-r--r-- 1 opendnssec opendnssec 1236207 Dec 17 09:17 /var/lib/opendnssec/unsigned/

$ grep ^www /var/lib/opendnssec/unsigned/
www             IN      A

The file should exist and contain normal DNS records.

Is the unsigned zonefile correct?
Code Block
$ named-checkzone /var/lib/opendnssec/unsigned/
zone loaded serial 2012121700

named-checkzone is part of Bind, any other DNS validator should work

Is the signed zonefile in the right place? 

Code Block
$ ls -al /var/lib/opendnssec/signed/
-rw-r--r-- 1 opendnssec opendnssec 26783556 Dec 17 13:17 /var/lib/opendnssec/signed/

$ grep ^www /var/lib/opendnssec/signed/     3600    IN      A     3600    IN      RRSIG   A 8 3 3600 20121226140702 20121212062213 60069 dt4JWUe9IWhkk5pMI0M<ABBREVIATED>Im1quqhd1PH0KdLA1jTUhWB04YkRQZov/xsF0us=

If there is no file in that location either 'zonelist.xml' is wrong or the signer is not running. If there are no RRSIGs in the file you are probably looking at the unsigned file.

Is the DNS-server working?

Code Block
$ dig +short @mydnsserver

If this fails check if the nameserver is running at all.

Does the zone served match the zone on disk?
Code Block
$ dig +short -tSOA @mydnsserver 2012121706 28800 14400 604800 3600

$ head -n1 /var/lib/opendnssec/signed/ 3600    IN      SOA 2012121706 28800 14400 604800 3600

The SOA should be the same, if there is a difference, use the higher value

Does the DNSKEY served by DNS match the key stored in the HSM? 
Code Block
$ dig +short -tDNSKEY @mydnsserver|grep ^257
257 3 8 AwEAAew<ABBREVIATED>jzvVb7LeI+thgsQAgi+EeyN8=

$ grep 'DNSKEY.*257' /var/lib/opendnssec/signed/ 3600    IN      DNSKEY  257 3 8 AwEAAew<ABBREVIATED>jzvVb7LeI+thgsQAgi+EeyN8= ;{id = 39269 (ksk), size = 2048b}

$ ods-ksmutil key export --keytype KSK --keystate ACTIVE --zone
;active KSK DNSKEY record: 3600    IN      DNSKEY  257 3 8 AwEAAew<ABBREVIATED>jzvVb7LeI+thgsQAgi+EeyN8= ;{id = 39269 (ksk), size = 2048b}

There should be one active KSK.

Have the signatures on the zone expired?
Code Block
$ grep 'RRSIG.*SOA ' /var/lib/opendnssec/signed/ 3600    IN      RRSIG   SOA 8 2 3600 20121231023929 20121217120754 60069 jeYlzkygV1HJ4PQ9TN1YQ8a9ZjLslsj1H5Z/MJyGVKWB5JEM9jxqp7foD7qZZ9jQI3+2AB8FRv7BUCb7pfBParRx9XsHEGHhHMf0aIktgxjD41TEGaHufjZj3LToD957qM6BUSOtu9HK0hl7zmfpz0iCJnd5FzT0bcPvkAf/k2k=

Look at the numbers 20121231023929 and 20121217120754 . These are timestamps, the key is only valid in this interval. (carefull, the first value is the expiration date!).

Preventing this situation is one of the primary purposes of OpenDNSSEC.  If this happens you should check that the OpenDNNSEC signer and validator are running. If they are running you should inspect the logs for problems.

There is not enough information in the logs

Temporarily increase the loglevel by using the ods-signer command:

Code Block
$ ods-signer verbosity 6
OpenDNSSEC doesn't seem to recogninze a zone while other zones work fine.  / Split-DNS doens't work.

OpenDNSSEC requires every zone to have a unique name and a unique outputfile (the inputfile can be shared among several zones). These requirements are more strict than those of the commonly used DNS-servers. Some tricks (like split-horizon DNS) are not yet possible with OpenDNSSEC.