I have a dnssec-secured domain that needs to remain valid for 8 weeks when all masters become unreachable.
To my understanding, setting sig-validity-interval to 64 7 in the zone's configuration file should generate SSIGs that last 64 days and that are automatically resigned by bind9 every 7 days.
When I finished implementing this for the domain, I was suprised to see dnsvis showing me that not all generated RRSIGs last 64 days. The RRSIGs for both DNSKEY and SOA do last the expected duration, but all other RRSIGs expire after 11 to 14 days.
I initially thought this might be a caching issue caused by running bind9 before setting the signature validity interval. So I stopped named, cleared /var/cache/bind and removed all DNSSEC files *.jbk, *.jnl, *.signed, and *.signed.jnl, then restarted bind again. This did not resolve the issue.
It's obvious I'm doing something wrong here but I don't know what. Below are the configuration snippets I use for the domain:
Zone declaration in named.conf.local:
zone "example.com" {
type master;
file ".../db.example.com";
allow-transfer { ... };
also-notify { ... };
inline-signing yes;
auto-dnssec maintain;
serial-update-method increment;
key-directory "...";
sig-validity-interval 64 7;
};
Contents of .../db.example.com:
$TTL 300
@ IN SOA ns1.example.com. admin.example.com. (
2021101004 ; Serial
10m ; Refresh
20m ; Retry
9w ; Expire
1h ) ; Negative Cache TTL
;
example.com. IN NS ns1.example.com.
example.com. IN NS ns2.example.com.
; ...