Project

General

Profile

Actions

Task #1496

closed

switch back to RRPproxy DNS and remove glue records

Added by Florian Effenberger about 9 years ago. Updated about 4 years ago.

Status:
Closed
Priority:
Normal
Category:
Domains and DNS
Target version:
Team - Q3/2020
Start date:
Due date:
% Done:

100%

Tags:

Description

We should give up our own DNS aliases, remove the glue records and fall back to the provider ones to make use of IPv6 DNS (and avoid manually tweaking glue records when IPs change). This also affects some external domains. Coordinate with Florian how to get that done.

Either Hetzner or RRPproxy come to mind, the latter one supporting DNSSEC.

Actions #1

Updated by Dennis Roczek about 9 years ago

  • Category set to Domains and DNS
Actions #2

Updated by Florian Effenberger over 8 years ago

  • Target version changed from Pool to Qlater

Shifting to later due to the infra changes

Actions #3

Updated by Florian Effenberger about 8 years ago

  • Assignee changed from Alexander Werner to Guilhem Moulin

re-assigning to Guilhem in order to clean up Redmine queues
nothing concrete to do at the moment

Actions #4

Updated by Florian Effenberger almost 8 years ago

I think at some point we should give up the DNS aliases and just move to the ISPs canonical name, then this ticket is also handled alongside

Actions #5

Updated by Florian Effenberger over 7 years ago

  • Subject changed from IPv6-enabled DNS glue record to switch back to Hetzner DNS incl. IPv6 glue records
  • Description updated (diff)
Actions #6

Updated by Florian Effenberger over 7 years ago

  • Priority changed from Low to Normal
  • Target version changed from Qlater to Q4/2017
Actions #7

Updated by Florian Effenberger over 6 years ago

  • Target version changed from Q4/2017 to Q3/2018

Although this ticket is old, I think it's not urgent
Let's shift to Q3, we can do so then in light of #2253 (DNSSEC/DANE/TLSA bits for mail)

Actions #8

Updated by Florian Effenberger over 6 years ago

  • Subject changed from switch back to Hetzner DNS incl. IPv6 glue records to switch back to Hetzner or RRPproxy DNS and remove glue records
  • Description updated (diff)
Actions #9

Updated by Florian Effenberger over 5 years ago

  • Target version changed from Q3/2018 to Q3/2019
Actions #10

Updated by Florian Effenberger almost 5 years ago

  • Target version changed from Q3/2019 to Q1/2020

Let's aim for Q1 indeed now

Actions #11

Updated by Florian Effenberger over 4 years ago

  • Status changed from New to In Progress
  • Priority changed from Normal to High
  • Target version changed from Q1/2020 to Q3/2020

Plan is to:

  1. move to KeyDNS, enabling DNSSEC, for all non-major domains
  2. update the DNS data for Hetzner for all major domains
  3. shortly thereafter, when 1. is finalized, also move the major domains to KeyDNS and DNSSEC
Actions #12

Updated by Florian Effenberger over 4 years ago

The majority of our domains is now connected to KeyDNS at RRPproxy, including DNSSEC signing
The main/production domains are not changed yet
The existing zones at Hetzner are not deleted yet
Glue records are updated, but (obviously) not deleted yet

For the DE domains, the DNSSEC keys have to be manually pushed, the automated push does not work
For some domains, pushing DNSSEC keys doesn't seem to work at all, chasing this one already

Guilhem and me to coordinate on the next steps

Actions #13

Updated by Florian Effenberger over 4 years ago

Domains where pushing DNSSEC does not work are the following. Let's try again tomorrow, if that fails, we need to reach out to support:

documentfoundation.fi
Pushing keys failed. Please try again later or contact support. Invalid attribute value syntax

libreoffice.cz
Pushing keys failed. Please try again later or contact support. Command failed; Command failed

libreoffice.fi
Pushing keys failed. Please try again later or contact support. Missing required attribute; missing tech contact

libreoffice.it
Pushing keys failed. Please try again later or contact support. Invalid attribute value [extepp:wrongvalueextepp:reasoncode => 10011: DNSSEC: dsData to add is already associated with the domain]

Actions #14

Updated by Florian Effenberger over 4 years ago

Current status:

Domains where pushing DNSSEC does not work are the following. Let's try again tomorrow, if that fails, we need to reach out to support:

documentfoundation.fi
Pushing keys failed. Please try again later or contact support. Invalid attribute value syntax

libreoffice.cz
Pushing keys failed. Please try again later or contact support. Command failed; Command failed

libreoffice.fi
Pushing keys failed. Please try again later or contact support. Invalid attribute value syntax

Will mail support about that

Actions #15

Updated by Guilhem Moulin over 4 years ago

Florian Effenberger wrote:

Domains where pushing DNSSEC does not work are the following.

documentfoundation.fi
Pushing keys failed. Please try again later or contact support. Invalid attribute value syntax

libreoffice.fi
Pushing keys failed. Please try again later or contact support. Invalid attribute value syntax

As you hinted at during the last 1:1 call .fi doesn't accept SHA-1 digest (type 2) in in DS records. (Perhaps a policy of the TLD, although I couldn't find sources for that.) Manually entering the DS record (SHA-256 only) and DNSKEY record fixes this. But that doesn't make the “Push KSK Keys to domain” button disappear and I'm not sure what that entails; can't make the button disappear for .at either, we'll see during the next key rotation/rollover if that causes any issue.

libreoffice.cz
Pushing keys failed. Please try again later or contact support. Command failed; Command failed

AFAICT the problem here was that the name servers were set to an external 3rd-party. This also caused resolution to fail with SERVFAIL, like for odfauthors.org and odftoolkit.org.

Actions #16

Updated by Guilhem Moulin over 4 years ago

  • Subject changed from switch back to Hetzner or RRPproxy DNS and remove glue records to switch back to RRPproxy DNS and remove glue records
Current status:
  • 131 domains registered at RRProxy.
  • 129 (all but libreoffice.org and documentation.org) changed to use RRPproxy's KeyDNS.
  • DNSSEC configured for 126 domains (missing support for hu, org.il and lt).
  • Same 3 CAA records added to all 129 domains (wildcard certs are explicitly disabled).
Mechanic sanity checks:
  • A record lookups at the root do succeed (NOERROR) for all 129 domains. A, AAAA, MX, TXT, SRV and CNAME records match what we have had at hetzner.
  • A record lookups at the root are fully validated for all 126 DNSSEC active domains.
  • Additional section has NS records set to ns[1-3].rrpproxy.net. for all 129 domains.
  • SOA MNAME (resp. RNAME) is set to ns1.rrpproxy.net. (resp. hostmaster.documentfoundation.org.) for all 129 domains.
  • Transfer lock is enabled whenever supported by the TLD.

Deleted the 111 zones at Hetzner that are no longer in use.

Will coordinate with Florian Effenberger next week regarding migration of our two main domains, namely libreoffice.org and documentation.org.

Actions #17

Updated by Guilhem Moulin over 4 years ago

Guilhem Moulin wrote:

  • A record lookups at the root do succeed (NOERROR) for all 129 domains. A, AAAA, MX, TXT, SRV and CNAME records match what we have had at hetzner.

That's no longer the case, I've now marked domains as null MX (IN MX 0 . and IN TXT "v=spf1 -all", cf. RFC 7505) whenever that made sense: NL domains, tdf.io, etc.

Actions #18

Updated by Florian Effenberger about 4 years ago

AI Guilhem
  • create zones (if required Guilhem to file a ticket)
  • set low TTL (e.g. 5-10 minutes)
  • import existing two (!) Hetzner zones -> today
  • start signing process
  • leave DNSSEC off for the moment
  • keep zones at Hetzner for the moment
  • check leftover Hetzner zones - WHOIS on domain, check if Hetzner or nsX.documentfoundation.org is used -> Florian to ping the owners then
AI Guilhem, Cloph, Florian
  • all of us review the DNS entires, share comments/thoughts/additions/deletions
  • merge all this
  • then agree on a day for switchover -> plan is Friday afternoon
later (!)
  • remove zones at Hetzner
  • raise TTL
  • enable DNSSEC
  • remove glue records
Actions #19

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

AI Guilhem
  • create zones (if required Guilhem to file a ticket)
  • set low TTL (e.g. 5-10 minutes)
  • start signing process

Done for documentfoundation.org, for libreoffice.org the folks at RRProxy need to reassign the zone first.

  • import existing two (!) Hetzner zones -> today

Blocking on the zone reassignation. Will proceed with the two domains at once.

  • leave DNSSEC off for the moment
  • keep zones at Hetzner for the moment
  • check leftover Hetzner zones - WHOIS on domain, check if Hetzner or nsX.documentfoundation.org is used -> Florian to ping the owners then
I count 18 leftover domains. 9 are up for grabs (NXDOMAIN) and could be bought back if desired:
  • documentfoundation.com.br
  • documentfoundation.net.br
  • documentfoundation.org.br
  • documentfoundation.srv.br
  • libreoffice.com.br
  • libreoffice.net.br
  • libreoffice.org.br
  • libreoffice.srv.br
  • thedocumentfoundation.org.br
6 use ns[1-3].documentfoundation.org (so the zone at Hetzner are authoritative):
  • documentfoundation.ca
  • documentfoundation.dk
  • libre-office.ca
  • libreoffice.ca
  • libreoffice.dk
  • thedocumentfoundation.ca
The remaining 3 use other name servers:
  • document-foundation.ca
  • documentfoundation.ru
  • libreoffice.ir
Actions #20

Updated by Guilhem Moulin about 4 years ago

Guilhem Moulin wrote:

Florian Effenberger wrote:

AI Guilhem
  • create zones (if required Guilhem to file a ticket)
  • set low TTL (e.g. 5-10 minutes)
  • start signing process

Done for documentfoundation.org, for libreoffice.org the folks at RRProxy need to reassign the zone first.

  • import existing two (!) Hetzner zones -> today

Blocking on the zone reassignation. Will proceed with the two domains at once.

Done. Some observations:

  • Non-default TTLs need to be added manually, RRProxy appears to have a 8h default which is unaffected by the SOA's MINTTL (which per RFC 2308 is fine);
  • RRPproxy chokes on SRV records with a trailing period, so these records can't be imported straight from a BIND-formatted zone file (once the trailing period is removed the DNS reply looks good though); and
  • RRPproxy chokes on RRs with implicit second-level domain such as foo IN MX mail, one needs to explicitly append a second-level and a trailing dot, namely foo IN MX mail.documentfoundation.org., so these records can't be imported straight from a BIND-formatted zone file (once the second-level domain and trailing period are added the DNS reply looks good though).
Actions #21

Updated by Guilhem Moulin about 4 years ago

Guilhem Moulin wrote:

  • RRPproxy chokes on SRV records with a trailing period, so these records can't be imported straight from a BIND-formatted zone file

Interestingly “null” SRV records such as _foo._tcp SRV 0 0 0 . (RFC 6186 §3) can be defined/imported, so at least we don't miss on expressivity here.

Actions #22

Updated by Florian Effenberger about 4 years ago

You can DELETE the following zones at Hetzner:
  • […]
You can also DELETE the following zones at Hetzner:
  • […]

Done, it's only the 6+2 zones left at Hetzner now (all active).

Actions #23

Updated by Florian Effenberger about 4 years ago

Original comment text:

Thanks a lot for your work on this!
You can DELETE the following zones at Hetzner:

documentfoundation.com.br
documentfoundation.net.br
documentfoundation.org.br
documentfoundation.srv.br
libreoffice.com.br
libreoffice.net.br
libreoffice.org.br
libreoffice.srv.br
thedocumentfoundation.org.br

I will check in parallel with Olivier about the domains, hostmaster@ is in cc - should we re-register, we will use KeyDNS at RRPproxy.
For the moment, please KEEP the following zones at Hetzner:

documentfoundation.ca
documentfoundation.dk
libre-office.ca
libreoffice.ca
libreoffice.dk
thedocumentfoundation.ca

I reached out to the domain name holders, asking how to proceed - either we transfer to TDF, or we ask the holders to change the DNS
You can also DELETE the following zones at Hetzner:

document-foundation.ca
documentfoundation.ru
libreoffice.ir
Actions #24

Updated by Florian Effenberger about 4 years ago

For documentfoundation.org

Note: I did NOT check if all entries from Hetzner have been properly converted. If in doubt, better double-check this, please. I ONLY checked for wrong or superflous records in the imported zone.

  • @ 600 IN CAA 0 issuewild ";"
    Is that desired? For the other domains I always set "letsencrypt.org" for "issuewild" as well. Fair enough if we don't use wildcard certificates, of course. ;-)
  • Does it make sense to keep multiple old DKIM entries? DKIM keys are only checked when the mail is received, so three year old, legacy records could be deleted if not used
  • There are some hostnames that could be old/outdated. Not sure, might be worth checking. Some that could be old are, maybe double-check with Cloph on these
    • floyd
    • engine
    • gucky
    • imageboard
    • owncloud
    • translations-old
  • Do we still run a Torrent tracker (tracker.tdf CNAME vm185)?
Actions #25

Updated by Florian Effenberger about 4 years ago

For libreoffice.org

Note: I did NOT check if all entries from Hetzner have been properly converted. If in doubt, better double-check this, please. I ONLY checked for wrong or superflous records in the imported zone.

  • @ 600 IN CAA 0 issuewild ";"
    Is that desired? For the other domains I always set "letsencrypt.org" for "issuewild" as well. Fair enough if we don't use wildcard certificates, of course. ;-)
  • There are some hostnames that could be old/outdated. Not sure, might be worth checking. Some that could be old are, maybe double-check with Cloph on these
    • ask-staging (yields "internal server error")
    • blog.vi (points to vi.blog, and then "this site is no longer available")
    • bugassistant (I think the assistant doesn't exist anymore, so we might want to get rid of the hostname; Cloph or Xisco should have details)
    • gerrit-test2
    • manual-test
    • roadshow (shows empty blog)
  • after September 30 (shutdown of Hosted.IM) we can also delete all XMPP/Jabber-related SRV entries
Actions #26

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

For documentfoundation.org

Note: I did NOT check if all entries from Hetzner have been properly converted. If in doubt, better double-check this, please. I ONLY checked for wrong or superflous records in the imported zone.

Like for other zones I ran a mechanic check on A+AAA+MX+TXT+SRV+CNAME RRs.

  • @ 600 IN CAA 0 issuewild ";"
    Is that desired? For the other domains I always set "letsencrypt.org" for "issuewild" as well. Fair enough if we don't use wildcard certificates, of course. ;-)

That's a defense in depth principle: lock down what we don't need/use; should we need wildcard certs later it's trivial to update later. Did a bulk change of other zones last weeks, cf. #1496#note-16.

I use that at home because my local resolver is spoofing various records, which breaks the trust anchor indeed. I don't think split DNS applies in our case because the Name Server on gustl is a passthrough except for the (invalid) tdf TLD.

  • Does it make sense to keep multiple old DKIM entries? DKIM keys are only checked when the mail is received, so three year old, legacy records could be deleted if not used

Those could be deleted indeed.

  • There are some hostnames that could be old/outdated. Not sure, might be worth checking. Some that could be old are, maybe double-check with Cloph on these
    • floyd

Well that's the salt master :-P

  • engine
  • gucky
  • imageboard
  • owncloud
  • translations-old

imageboard is used, https://imageboard.documentfoundation.org/ is a 303 redirect to the design blog since the mascot fiasco. Would also keep owncloud as removing it would break very old federation lists (not sure either how the desktop client deals with 301 redirects). The rest can be deleted indeed.

  • Do we still run a Torrent tracker (tracker.tdf CNAME vm185)?

curl http://tracker.documentfoundation.org:6969/stat says yes, and people do complain when it's down :-)

Actions #27

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

For libreoffice.org

Note: I did NOT check if all entries from Hetzner have been properly converted. If in doubt, better double-check this, please. I ONLY checked for wrong or superflous records in the imported zone.

  • @ 600 IN CAA 0 issuewild ";"
    Is that desired? For the other domains I always set "letsencrypt.org" for "issuewild" as well. Fair enough if we don't use wildcard certificates, of course. ;-)

See #1496#note-26

  • There are some hostnames that could be old/outdated. Not sure, might be worth checking. Some that could be old are, maybe double-check with Cloph on these
    • ask-staging (yields "internal server error")

Used by Evgeny for development AFAICT; could probably use a local resolver instead, but IMHO we can keep this record until ask.libo is used in production.

  • bugassistant (I think the assistant doesn't exist anymore, so we might want to get rid of the hostname; Cloph or Xisco should have details)

Right that's a redirect to bugs.tdf

  • gerrit-test2

Unused, can be deleted.

  • manual-test

See #2668.

  • blog.vi (points to vi.blog, and then "this site is no longer available")
  • roadshow (shows empty blog)

Italo removed these a while ago, records can be deleted I guess.

  • after September 30 (shutdown of Hosted.IM) we can also delete all XMPP/Jabber-related SRV entries

Ack.

Actions #28

Updated by Florian Effenberger about 4 years ago

Like for other zones I ran a mechanic check on A+AAA+MX+TXT+SRV+CNAME RRs.

Perfect!

That's a defense in depth principle: lock down what we don't need/use;
should we need wildcard certs later it's trivial to update later. Did a
bulk change of other zones last weeks, cf. #1496#note-16
<https://redmine.documentfoundation.org/issues/1496#note-16&gt;.

Fine for me!

  • Does it make sense to keep multiple old DKIM entries? DKIM keys
    are only checked when the mail is received, so three year old,
    legacy records could be deleted if not used

Those could be deleted indeed.

Then let's remove them. :)

Well that's the salt master :-P

Ooops :)

|imageboard| is used, https://imageboard.documentfoundation.org/ is a
303 redirect to the design blog since the mascot fiasco. Would also keep |owncloud| as removing it would break very old federation lists (not
sure either how the desktop client deals with 301 redirects). The rest
can be deleted indeed.

Ok, then let's make it so.

Used by Evgeny for development AFAICT; could probably use a local resolver instead, but IMHO we can keep this record until ask.libo is used in production.

Let's keep it then indeed.

bugassistant (I think the assistant doesn't exist anymore, so we might want to get rid of the hostname; Cloph or Xisco should have details)

Right that's a redirect to bugs.tdf

If Cloph has no objections, let's delete it.

gerrit-test2

Unused, can be deleted.

Let's do that. :)

blog.vi (points to vi.blog, and then "this site is no longer available")
roadshow (shows empty blog)

Italo removed these a while ago, records can be deleted I guess.

Same here, let's remove it then.

Actions #29

Updated by Florian Effenberger about 4 years ago

We can't transfer the CA domains due to local presence requirements, but
the domain holder can update the WHOIS.

Can you create DNS records at RRPproxy for

documentfoundation.ca
libre-office.ca
libreoffice.ca
thedocumentfoundation.ca
document-foundation.ca

and let me know when done?

Actions #30

Updated by Guilhem Moulin about 4 years ago

Cleaned up accordingly (only on the KeyDNS side). Kept bugassistant though since there are likely left over links around.

Note to self: we can also remove ns[1-3].documentfoundation.org once the migration is complete.

Actions #31

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

Can you create DNS records at RRPproxy for

documentfoundation.ca
libre-office.ca
libreoffice.ca
thedocumentfoundation.ca
document-foundation.ca

and let me know when done?

Done. All 4 zones are unsigned, null MX, and with A+AAAA records for @ and www pointing to the main site.

Actions #32

Updated by Florian Effenberger about 4 years ago

Perfect! Let's chat this afternoon for the switchover for the main
domains :)

Actions #33

Updated by Florian Effenberger about 4 years ago

For the DK domain names, we have these indeed already, but directly with Hostmaster DK
I was creating the default set of DNS entries at RRPproxy (please double check, IIRC you modified e.g. the CAA record), and started DNSSEC signing
I've changed the nameservers (without DNSSEC yet) at Hostmaster DK
Will in parallel find out with RRPproxy if we can transfer the domain names directly there

Actions #34

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

I was creating the default set of DNS entries at RRPproxy (please double check, IIRC you modified e.g. the CAA record)

I think record sets are useless as they provide no advantage over the API and the API gives more flexibility, but I did bring the set in line with the zones last week (updated the CAA record and set null MX config), so these two new zones are consistent with the other ones :-)

Actions #35

Updated by Guilhem Moulin about 4 years ago

  • % Done changed from 0 to 90

Pointed documentfoundation.org and libreoffice.org to RRProxy now, with a 600s TTL on every RR. DNSSEC lookups are available on demand but the parent zone wasn't updated with the KSK: should resigning turn sour, validating resolvers won't choke on these two. Plan is to enable DNSSEC once we've verified resigning worked fine on other domains in the same TLD. According to https://wiki.rrpproxy.net/dns/keydns/enable-dnssec-for-keydns-zones that should be around September 10.

Actions #36

Updated by Florian Effenberger about 4 years ago

  • No problems reported so far, but let's keep libreoffice.org and
    documentfoundation.org as zones at Hetzner, for a fallback/backup, for
    some more days at least.
  • Can you check again if you can push the keys for libreoffice.cz? Last
    times I got an error message, ticket with RRPproxy is open.
  • You can delete the .DK and .CA domains from Hetzner. WHOIS shows
    RRPproxy DNS, dig yields a result, so transition to RRPproxy seems done.
  • For the .DK domains, if you let me know the DNSSEC data, I can update
    the domains at the registrar to use a signed zone.
Actions #37

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

  • Can you check again if you can push the keys for libreoffice.cz? Last times I got an error message, ticket with RRPproxy is open.

Answered this in #1496#note-15, per #1496#note-16 A record lookups at the root is fully validated.

  • You can delete the .DK and .CA domains from Hetzner.

Done, that leaves only documentfoundation.org and libreoffice.org. ns[1-3].documentfoundation.org RRs are no longer used so I removed these from KeyDNS.

  • For the .DK domains, if you let me know the DNSSEC data, I can update the domains at the registrar to use a signed zone
documentfoundation.dk. IN DNSKEY 257 3 7 AwEAAeukhjXrV5LX3fn+u28zq2P/lA6r+bAnupetWAiV6skMw7ZUZgMy5m7BEuuNXNHXi8v4a/osvu6op6VnEiqPyyeAHJpWSIAwGjLzVUKB8EKJshShf73KIDoVK426EHdr/rO4WW1Vq7iEwUvNwXqrcpjG3p4yOYW1vXOWrNl2/v8mhXzw/SFeQmN3zxabKYyO9Lg9jzxbmXJu93aAtK43cB4YaWUwIZxdc1MEXBsY/nJIuyZcHDlmOcqhYpfQdAozpdeTr8A5Y+gud05xz6/fJx9nU48R6wMzigQqN0LqpLPu+veLA9zznX1mRJVVxn1H6ZcefHrbcNtpaEKSORQeeuM=
documentfoundation.dk. IN DS 32871 7 1 262F5CFC1D433252285D98721BDEF944F4DBCAE4
documentfoundation.dk. IN DS 32871 7 2 7D9722AEFF45BBC43393D6BA3EC168550C5FF4FFF1DFB4E6F9DC899C36983C11
libreoffice.dk. IN DNSKEY 257 3 7 AwEAAci1m1nyqO83lW7Bbr+YwDdk9bGYB02Ag3XOldLYkuNUriv6jVDCHQBiYIIZRieZQdPiUH/cB2si/0uNVoMjVQkCLHQvXBdXMorbXSQQyxCqtc020dSbu9rGraez6+TCpCFN4u7Iv6qEdBvcLZk9B6ciM0HP7IKjoXd73RPzAp+uiOCmy9yAy/KWuBPr/2xbKJU3WZu/qcHQp4HyTLYQ0Ixf7IV/ciTsNEyjfhr3+QKvN6+ukfIEOz9I6NlA8JHAJRugku477s4FEOZXO/NR8aT5u+dQI93b5wKL05Hrgf9hZCCjq16xxw/Ew76Mk01N+I2u+e7y8+LiZNK+Dhzlu+E=
libreoffice.dk. IN DS 13773 7 1 E827A5A34892D98DE44E72B330C0D2920BE1F96B
libreoffice.dk. IN DS 13773 7 2 85BBB617D397AF09C7C76F7D76990C471B659C4C249714657BC2AB23E9AB7D38 

(Fetched using the API as DNS isn't authenticated yet.)

Actions #38

Updated by Florian Effenberger about 4 years ago

documentfoundation.dk. IN DNSKEY 257 3 7 AwEAAeukhjXrV5LX3fn+u28zq2P/lA6r+bAnupetWAiV6skMw7ZUZgMy5m7BEuuNXNHXi8v4a/osvu6op6VnEiqPyyeAHJpWSIAwGjLzVUKB8EKJshShf73KIDoVK426EHdr/rO4WW1Vq7iEwUvNwXqrcpjG3p4yOYW1vXOWrNl2/v8mhXzw/SFeQmN3zxabKYyO9Lg9jzxbmXJu93aAtK43cB4YaWUwIZxdc1MEXBsY/nJIuyZcHDlmOcqhYpfQdAozpdeTr8A5Y+gud05xz6/fJx9nU48R6wMzigQqN0LqpLPu+veLA9zznX1mRJVVxn1H6ZcefHrbcNtpaEKSORQeeuM=
documentfoundation.dk. IN DS 32871 7 1 262F5CFC1D433252285D98721BDEF944F4DBCAE4
documentfoundation.dk. IN DS 32871 7 2 7D9722AEFF45BBC43393D6BA3EC168550C5FF4FFF1DFB4E6F9DC899C36983C11
libreoffice.dk. IN DNSKEY 257 3 7 AwEAAci1m1nyqO83lW7Bbr+YwDdk9bGYB02Ag3XOldLYkuNUriv6jVDCHQBiYIIZRieZQdPiUH/cB2si/0uNVoMjVQkCLHQvXBdXMorbXSQQyxCqtc020dSbu9rGraez6+TCpCFN4u7Iv6qEdBvcLZk9B6ciM0HP7IKjoXd73RPzAp+uiOCmy9yAy/KWuBPr/2xbKJU3WZu/qcHQp4HyTLYQ0Ixf7IV/ciTsNEyjfhr3+QKvN6+ukfIEOz9I6NlA8JHAJRugku477s4FEOZXO/NR8aT5u+dQI93b5wKL05Hrgf9hZCCjq16xxw/Ew76Mk01N+I2u+e7y8+LiZNK+Dhzlu+E=
libreoffice.dk. IN DNS 13773 7 1 E827A5A34892D98DE44E72B330C0D2920BE1F96B
libreoffice.dk. IN DNS 13773 7 2 85BBB617D397AF09C7C76F7D76990C471B659C4C249714657BC2AB23E9AB7D38

DK Hostmaster lets me add "DNSSEC key". Is that DNSKEY or DS?

Actions #39

Updated by Florian Effenberger about 4 years ago

Done, that leaves only documentfoundation.org and libreoffice.org.
ns[1-3].documentfoundation.org DS RRs are no longer used so I removed
these from KeyDNS.

Then I think we can also remove the glue records, correct? Can you do that?

Actions #40

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

DK Hostmaster lets me add "DNSSEC key". Is that DNSKEY or DS?

The (public) key material is in the DNSKEY record. DS RRs are its digest values using various alorigthms (SHA-1 and -256 in the above).

Then I think we can also remove the glue records, correct? Can you do that?

Right, done.

Actions #41

Updated by Florian Effenberger about 4 years ago

Fields to add are Keytag, Algorithm, Digest type and Digest, so then
I'll try with the latter :)

The Document Foundation Redmine wrote:

The (public) key material is in the DNSKEY record. DS RRs are its digest
values using various alorigthms (SHA-1 and -256 in the above).

Actions #42

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

Fields to add are Keytag, Algorithm, Digest type and Digest

Just split the record by word?

documentfoundation.dk. IN DS 32871 7 1 262F5CFC1D433252285D98721BDEF944F4DBCAE4

Means

Cf. RFC 4034 sec. 5.1 :-)

Actions #43

Updated by Guilhem Moulin about 4 years ago

Guilhem Moulin wrote:

Just split the record by word?

(But the DNSKEY record should be enough.)

Actions #44

Updated by Florian Effenberger about 4 years ago

Couldn't add that due to missing algorithms, so was using the DS, seems
to work :)

Actions #45

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

Couldn't add that due to missing algorithms, so was using the DS, seems to work :)

Confirmed

Actions #46

Updated by Guilhem Moulin about 4 years ago

  • Priority changed from High to Normal

Lowering severity now, the only thing left is to raise the TTL and update the parent zone with the KSKs (and remove zones at Hetzner for cleanup). (Severity was raised as we were using brittle Name Servers.)

It'll be one week tomorrow that we updated the name servers and AFAICT the transition was smooth. I propose to raise the SOA and RRs TTLs tomorrow (or at least before deploying DNSSEC at the end of next week), any objection? AFAICT the change requires to delete and recreate each record, but using the API this can be done in a single operation which appears to be atomic.

Actions #47

Updated by Florian Effenberger about 4 years ago

Lowering severity now, the only thing left is to raise the TTL and

ACK

It'll be one week tomorrow that we updated the name servers and AFAICT
the transition was smooth. I propose to update the SOA and RRs TTLs

I agree, no problems whatsoever. :-)

tomorrow (ie before deploying DNSSEC), any objection? AFAICT the change
requires to delete and recreate each record, but using the API this can
be done in a single call which appears to be atomic.

If you can take care of it and are available in case of emergencies,
fine for me - doing it during the weekend is definitely better than
during the week, so fine for me!

Actions #48

Updated by Guilhem Moulin about 4 years ago

Florian Effenberger wrote:

If you can take care of it and are available in case of emergencies, fine for me

Done. I wasn't able able to it atomically though: the records were updated (exporting the zones using the API showed the new TTL) but the changes were not reflected in DNS queries to the authoritative server. But AFAICT the DNS has a 5min cache and picks up changes at fixed intervals, so in practice consecutive changes won't yield bogus replies.

Guilhem Moulin wrote:

Kept bugassistant though since there are likely left over links around.

Seems it was deleted anyway… this name is also used as SAN in the bugs.tdf CSR, so blindly removing it would have failed the next ACME challenge thus cert renewal for bugs.tdf! Added back for now.

Actions #49

Updated by Florian Effenberger about 4 years ago

One more "cleanup" task:

For all domains, in the past I've set the "Whois banner", "RSP tag", "URL" fields. These can be removed, as we can configure them centrally. Nothing urgent, but can be done as some cleanup tasks. A API call on all domains should be able to remove the fields/empty the strings.

Actions #50

Updated by Florian Effenberger about 4 years ago

Another thing we can consider, likewise "cleanup" and not urgent:

We've used the non-whitelabel DNS for all domains because of the "Inconsistent set of NS RRs" error message for .DE domains.
The solution to that is to, for .DE domains only, add an explicit NS entry in the zone, pointing to the whitelabel DNS.
So we can, if we want, move all domains to the whitelabel variant.

Actions #51

Updated by Florian Effenberger about 4 years ago

Turns out that even if you set whitelabel DNS, the NS entry in the zone is on the branded one, so if we change that for .DE, we should change it for all zones actually

Actions #52

Updated by Guilhem Moulin about 4 years ago

FYI the ZSK rotation seems stable, one can see the RRSIGs updating and of the 138 registered zones 128 still validate, the remaining ones being the 5 zones under the ca TLD, .{hu,li,lt} for which there is no DNSSEC support, and {libreoffice,documentfoundation}.org. As far as I'm concerned it's all good to flip the switch on the latter two also.

Actions #53

Updated by Florian Effenberger about 4 years ago

Fine for me, during the weekend, whenever you are around to react in
case of issues. :-)

Actions #54

Updated by Guilhem Moulin about 4 years ago

  • Status changed from In Progress to Closed
  • % Done changed from 90 to 100

Florian Effenberger wrote:

Fine for me, during the weekend, whenever you are around to react in case of issues. :-)

Done, that makes my validating resolver happy

Actions

Also available in: Atom PDF