|
43 | 43 | <refsect1> |
44 | 44 | <title>Positive Trust Anchors</title> |
45 | 45 |
|
46 | | - <para>Positive trust anchor configuration files contain DNSKEY and |
47 | | - DS resource record definitions to use as base for DNSSEC integrity |
48 | | - proofs. See <ulink |
49 | | - url="https://tools.ietf.org/html/rfc4035#section-4.4">RFC 4035, |
50 | | - Section 4.4</ulink> for more information about DNSSEC trust |
51 | | - anchors.</para> |
| 46 | + <para>Positive trust anchor configuration files contain <constant class='dns'>DNSKEY</constant> and |
| 47 | + <constant class='dns'>DS</constant> resource record definitions to use as base for DNSSEC integrity |
| 48 | + proofs. See <ulink url="https://tools.ietf.org/html/rfc4035#section-4.4">RFC 4035, Section 4.4</ulink> |
| 49 | + for more information about DNSSEC trust anchors.</para> |
52 | 50 |
|
53 | 51 | <para>Positive trust anchors are read from files with the suffix |
54 | 52 | <filename>.positive</filename> located in |
|
64 | 62 | <filename>/run/dnssec-trust-anchors.d/</filename> that is either |
65 | 63 | empty or a symlink to <filename>/dev/null</filename> ("masked").</para> |
66 | 64 |
|
67 | | - <para>Positive trust anchor files are simple text files resembling |
68 | | - DNS zone files, as documented in <ulink |
69 | | - url="https://tools.ietf.org/html/rfc1035#section-5">RFC 1035, Section |
70 | | - 5</ulink>. One DS or DNSKEY resource record may be listed per |
71 | | - line. Empty lines and lines starting with a semicolon |
72 | | - (<literal>;</literal>) are ignored and considered comments. A DS |
73 | | - resource record is specified like in the following example:</para> |
| 65 | + <para>Positive trust anchor files are simple text files resembling DNS zone files, as documented in |
| 66 | + <ulink url="https://tools.ietf.org/html/rfc1035#section-5">RFC 1035, Section 5</ulink>. One <constant |
| 67 | + class='dns'>DS</constant> or <constant class='dns'>DNSKEY</constant> resource record may be listed per |
| 68 | + line. Empty lines and lines starting with <literal>#</literal> or <literal>;</literal> are ignored, which |
| 69 | + may be used for commenting. A <consant class='dns'>DS</consant> resource record is specified like in the |
| 70 | + following example:</para> |
74 | 71 |
|
75 | 72 | <programlisting>. IN DS 19036 8 2 49aac11d7b6f6446702e54a1607371607a1a41855200fd2ce1cdde32f24e8fb5</programlisting> |
76 | 73 |
|
|
85 | 82 | Section 5</ulink> for details about the precise syntax and meaning |
86 | 83 | of these fields.</para> |
87 | 84 |
|
88 | | - <para>Alternatively, DNSKEY resource records may be used to define |
89 | | - trust anchors, like in the following example:</para> |
| 85 | + <para>Alternatively, <constant class='dns'>DNSKEY</constant> resource records may be used to define trust |
| 86 | + anchors, like in the following example:</para> |
90 | 87 |
|
91 | 88 | <programlisting>. IN DNSKEY 257 3 8 AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0=</programlisting> |
92 | 89 |
|
93 | | - <para>The first word specifies the domain again, the second word |
94 | | - must be <literal>IN</literal>, followed by |
95 | | - <literal>DNSKEY</literal>. The subsequent words encode the DNSKEY |
96 | | - flags, protocol and algorithm fields, followed by the key data |
97 | | - encoded in Base64. See <ulink |
98 | | - url="https://tools.ietf.org/html/rfc4034#section-2">RFC 4034, |
99 | | - Section 2</ulink> for details about the precise syntax and meaning |
100 | | - of these fields.</para> |
| 90 | + <para>The first word specifies the domain again, the second word must be <literal>IN</literal>, followed |
| 91 | + by <literal>DNSKEY</literal>. The subsequent words encode the <constant class='dns'>DNSKEY</constant> |
| 92 | + flags, protocol and algorithm fields, followed by the key data encoded in Base64. See <ulink |
| 93 | + url="https://tools.ietf.org/html/rfc4034#section-2">RFC 4034, Section 2</ulink> for details about the |
| 94 | + precise syntax and meaning of these fields.</para> |
101 | 95 |
|
102 | | - <para>If multiple DS or DNSKEY records are defined for the same |
103 | | - domain (possibly even in different trust anchor files), all keys |
104 | | - are used and are considered equivalent as base for DNSSEC |
105 | | - proofs.</para> |
| 96 | + <para>If multiple <constant class='dns'>DS</constant> or <constant class='dns'>DNSKEY</constant> records |
| 97 | + are defined for the same domain (possibly even in different trust anchor files), all keys are used and |
| 98 | + are considered equivalent as base for DNSSEC proofs.</para> |
106 | 99 |
|
107 | 100 | <para>Note that <filename>systemd-resolved</filename> will |
108 | 101 | automatically use a built-in trust anchor key for the Internet |
|
112 | 105 | as soon as at least one trust anchor key for the root domain is |
113 | 106 | defined in trust anchor files.</para> |
114 | 107 |
|
115 | | - <para>It is generally recommended to encode trust anchors in DS |
116 | | - resource records, rather than DNSKEY resource records.</para> |
117 | | - |
118 | | - <para>If a trust anchor specified via a DS record is found revoked |
119 | | - it is automatically removed from the trust anchor database for the |
120 | | - runtime. See <ulink url="https://tools.ietf.org/html/rfc5011">RFC |
121 | | - 5011</ulink> for details about revoked trust anchors. Note that |
122 | | - <filename>systemd-resolved</filename> will not update its trust |
123 | | - anchor database from DNS servers automatically. Instead, it is |
124 | | - recommended to update the resolver software or update the new |
125 | | - trust anchor via adding in new trust anchor files.</para> |
| 108 | + <para>It is generally recommended to encode trust anchors in <constant class='dns'>DS</constant> resource |
| 109 | + records, rather than <constant class='dns'>DNSKEY</constant> resource records.</para> |
| 110 | + |
| 111 | + <para>If a trust anchor specified via a <constant class='dns'>DS</constant> record is found revoked it is |
| 112 | + automatically removed from the trust anchor database for the runtime. See <ulink |
| 113 | + url="https://tools.ietf.org/html/rfc5011">RFC 5011</ulink> for details about revoked trust anchors. Note |
| 114 | + that <filename>systemd-resolved</filename> will not update its trust anchor database from DNS servers |
| 115 | + automatically. Instead, it is recommended to update the resolver software or update the new trust anchor |
| 116 | + via adding in new trust anchor files.</para> |
126 | 117 |
|
127 | 118 | <para>The current DNSSEC trust anchor for the Internet's root |
128 | 119 | domain is available at the <ulink |
|
0 commit comments