Created: 2022-08-30 Tue 06:45
master and slave have been used to describe primary
and secondary authoritative DNS servers in the past.
primary (instead of master) and secondary (instead
of slave) whenever possible.
% rndc nta -l 60 fail01.dnssec.works Negative trust anchor added: fail01.dnssec.works/_default, expires 18-Aug-2016 13:52:19.000 % rndc nta -dump fail01.dnssec.works: expired 18-Aug-2016 13:52:19.000 % ls -l /var/named/_default.nta -rw-r--r--. 1 root root 44 Aug 18 13:51 /var/named/_default.nta % cat /var/named/_default.nta fail01.dnssec.works. regular 20160818115219
% rndc nta -l 86400 fail02.dnssec.works # add a NTA for 1 day Negative trust anchor added: fail02.dnssec.works/_default, expires 19-Aug-2016 13:56:22.000 % rndc nta -dump fail02.dnssec.works: expiry 19-Aug-2016 13:56:22.000 % rndc nta -r fail02.dnssec.works # remove the NTA Negative trust anchor removed: fail02.dnssec.works/_default % rndc nta -dump # NTA is now gone
$ ldns-walk paypal.com
NSEC3PARAM record. This
record holds information needed by authoritative DNS servers to
generate NSEC3 records for negative answersnsec3.dnslab.org. 0 IN NSEC3PARAM 1 0 20 ABBACAFE
0 (meaning 1 iteration of
SHA1 hashing)
-1 0 0 - (SHA1 Hash,
no flags, 1 iteration, no salt)dnssec-cds utility can change DS records for a child zone
based on CDS/CDNSKEY records
SERVFAIL to the DNS client whenever it detects a mismatch in
the DNSSEC chain of trust or a bogus or expired DNSSEC signature
SERVFAIL is not DNSSEC specific, there are many error
situations that can result in an SERVFAIL response
unbound-host) before submitting to the operator of the parent
zone
| Algorithm | No. | Note |
|---|---|---|
| 1 | deprecated, not implemented | |
| 5 | not recommend, deprectated for DNSSEC signing, not supported in Red Hat Enterprise Linux 9 (and up) | |
| RSASHA256 | 8 | recommended |
| RSASHA512 | 10 | large keys, large signatures, risk of UDP fragmentation or TCP fallback |
| 3 | deprecated, slow validation, no extra security | |
| 12 | deprecated | |
| ECDSA | 13/14 | small signatures, read RSA vs ECDSA for DNSSEC |
| ED448/ED25519 | 16/15 | not supported by legacy resolver RFC 8080 / RFC 8032 Edwards-Curve Digital Signature Algorithm (EdDSA) / Assessing DNSSEC with EdDSA |
Questions?