logoalt Hacker News

deepsuntoday at 4:27 AM4 repliesview on HN

How to make it DNSSEC?


Replies

peteetoday at 2:20 PM

If you're a masochist you can do it manually, just make sure you have a good grasp of whats going on first[1]

Simplistically you need a DS record at your registrar, then sign your zones before publishing. You can cheat and make the KSK not expire, which saves some aggravation. I've rolled my own by hand for 10 yrs with no dnssec related downtime

[1] DNSSEC Operational Practices https://datatracker.ietf.org/doc/html/rfc6781

gucci-on-fleektoday at 5:10 AM

With Knot, you can just add ~8 lines to your config [0], copy the records to your registrar, and then you're done.

[0]: https://www.knot-dns.cz/docs/3.5/singlehtml/index.html#autom...

show 1 reply
jcgltoday at 10:09 AM

Knot (as suggested by others) is good. As are BIND and PowerDNS. These are the big authoritative resolvers I think of at least, and all of them allow for basically hands-free DNSSEC; just flip a switch and you'll have it. I've run DNSSEC with all three and have no complaints.

And when using such turn-key DNSSEC support, I think there's very little risk to enabling it. While other commenters pointing out its marginal utility are correct, turn-key DNSSEC support that Just Works™ de-risks it enough for me that the relatively marginal utility just isn't a concern.

Plus, once you've got DNSSEC enabled, you can at the very least start to enjoy stuff like SSHFP records. DANE may not have any real-world traction, but who knows what the future may bring.

adiabatichottubtoday at 4:53 AM

If you don't absolutely have to, then don't.

That is to say, if you misconfigure it, or try to turn it off, you will have an invalid domain until the TTL runs out, and it's really just not worth the headache unless you have a real use case.

show 1 reply