I have a dnssec-secured domain that needs to remain valid for 8 weeks when all masters become unreachable.
To my understanding, setting sig-validity-interval
to 64 7
in the zone's configuration file should generate SSIG
s that last 64 days and that are automatically resigned by bind9 every 7 days.
When I finished implementing this for the domain, I was suprised to see dnsvis showing me that not all generated RRSIG
s last 64 days. The RRSIG
s for both DNSKEY
and SOA
do last the expected duration, but all other RRSIG
s expire after 11 to 14 days.
I initially thought this might be a caching issue caused by running bind9 before setting the signature validity interval. So I stopped named
, cleared /var/cache/bind
and removed all DNSSEC files *.jbk
, *.jnl
, *.signed
, and *.signed.jnl
, then restarted bind again. This did not resolve the issue.
It's obvious I'm doing something wrong here but I don't know what. Below are the configuration snippets I use for the domain:
Zone declaration in named.conf.local
:
zone "example.com" {
type master;
file ".../db.example.com";
allow-transfer { ... };
also-notify { ... };
inline-signing yes;
auto-dnssec maintain;
serial-update-method increment;
key-directory "...";
sig-validity-interval 64 7;
};
Contents of .../db.example.com
:
$TTL 300
@ IN SOA ns1.example.com. admin.example.com. (
2021101004 ; Serial
10m ; Refresh
20m ; Retry
9w ; Expire
1h ) ; Negative Cache TTL
;
example.com. IN NS ns1.example.com.
example.com. IN NS ns2.example.com.
; ...