Revision history for ksknzsk


Revision [2904]

Last edited on 2012-06-07 09:15:26 by xoxide [spelling]
Additions:
As stated on the project page, the root keys are used to sign the root zone. These keys need to be generated on the server. Before this is done, a directory structure needs to be agreed upon to store the keys in. This dir will also have 700 permissions. Currently I propose /etc/bind/dnssec/ with the zsk and zsk dir's inside.
Deletions:
As stated on the project page, the root keys are used to sign the root zone. These keys need to be generated on the server. Before this is done, a direcotry structure needs to be agreed upon to store the keys in. This dir will also have 700 permissions. Currently I propose /etc/bind/dnssec/ with the zsk and zsk dir's inside.


Revision [2553]

Edited on 2011-07-29 13:50:45 by JulianDemarchi [added more info]
Additions:
The root keys need to be generated on ns0. The issue with the nature of OpenNIC is it's diversity. Thus trust of the actually creation of the keys is an issue. To solve this I propose the actuall key generation be done in a multi screen session. Once these keys are created a flat file called CREATED will be made with the date the keys were generated. This will then be used by a script to email the admins when the keys approach their expire date. The members who would witness are Brian and Jeff. Below are the commands that will be run to create the keys.
Deletions:
The root keys need to be generated on ns0. The issue with the nature of OpenNIC is it's diversity. Thus trust of the actually creation of the keys is an issue. To solve this I propose the actuall key generation be done in a multi screen session. The members who would witness are Brian and Jeff. Below are the commands that will be run to create the keys.


Revision [2551]

Edited on 2011-07-28 21:19:21 by JulianDemarchi [added more info]
Additions:
DNSSEC keys need to be regenerated every 3 to 6 months. The frequency we will follow is un-decided at this point. To regenerate we'll follow the same procedure as we did to create the keys.


Revision [2550]

Edited on 2011-07-28 21:03:24 by JulianDemarchi [first draft]
Additions:

As stated on the project page, the root keys are used to sign the root zone. These keys need to be generated on the server. Before this is done, a direcotry structure needs to be agreed upon to store the keys in. This dir will also have 700 permissions. Currently I propose /etc/bind/dnssec/ with the zsk and zsk dir's inside.

The root keys need to be generated on ns0. The issue with the nature of OpenNIC is it's diversity. Thus trust of the actually creation of the keys is an issue. To solve this I propose the actuall key generation be done in a multi screen session. The members who would witness are Brian and Jeff. Below are the commands that will be run to create the keys.

In the zsk dir:
//dnssec-keygen -r /dev/urandom -a RSASHA1 -b 1024 -n ZONE .//

In the ksk dir:
//dnssec-keygen -r /dev/urandom -a RSASHA1 -b 4096 -n ZONE -f KSK .//
Deletions:
Sign the OpenNIC root zone


Revision [2546]

The oldest known version of this page was created on 2011-07-28 20:20:40 by JulianDemarchi [first draft]
Valid XHTML :: Valid CSS: :: Powered by WikkaWiki