-
Hello, I am in the process of implementing DNSSEC on an Internet resolver using PowerDNS Recursor. I noticed in your documentation that you state you do not support RFC 5011, which concerns the automatic update of trust keys for DNSSEC. However, when I activate DNSSEC on my resolver, it seems to work correctly and is able to validate the root servers of the Internet. Could you explain how PowerDNS Recursor manages trust keys for DNSSEC without the support of RFC 5011? Does the resolver use another method to obtain and update trust keys?
The "ad" field for authentic data is indeed present. Thank you in advance for your help. Best regards, |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
The trust anchors for the root are shipped as part of:
You should also be aware that 5011 does not solve the problem of initial discovery; it only solves the problem of following the path from an old key to a new key while it is happening. My personal opinion is that 5011 was a mistake and we should let other distribution methods handle the problem, just like we all do for the CA/WebPKI system. |
Beta Was this translation helpful? Give feedback.
-
The root key lifecycle is very long. Once the new key data is released in 2025 by ICANN, we will start including the corresponding trust anchor (in addition to the existing one) in the recursor. It wil then take at least two years before the new key actually gets used. |
Beta Was this translation helpful? Give feedback.
The root key lifecycle is very long. Once the new key data is released in 2025 by ICANN, we will start including the corresponding trust anchor (in addition to the existing one) in the recursor. It wil then take at least two years before the new key actually gets used.
https://www.icann.org/en/announcements/details/icann-to-generate-new-dns-cryptographic-key-at-april-2024-ceremony-28-02-2024-en