Ticket was cloned from Red Hat Bugzilla (product Red Hat Enterprise Linux 8): Bug 1912556
Description of problem: When DNSSEC is enabled for the zone two DNSKEYs should be created for the zone: one KSK key (for trust chain connection from upper level zone) and one ZSK key for record signing. Currently two KSK DNSKEYs are created. Version-Release number of selected component (if applicable): ipa-selinux-4.8.7-12.module_el8.3.0+511+8a502f20.noarch ipa-server-dns-4.8.7-12.module_el8.3.0+511+8a502f20.noarch ipa-common-4.8.7-12.module_el8.3.0+511+8a502f20.noarch ipa-client-4.8.7-12.module_el8.3.0+511+8a502f20.x86_64 ipa-healthcheck-core-0.4-6.module_el8.3.0+482+9e103aab.noarch ipa-server-common-4.8.7-12.module_el8.3.0+511+8a502f20.noarch ipa-server-4.8.7-12.module_el8.3.0+511+8a502f20.x86_64 ipa-server-trust-ad-4.8.7-12.module_el8.3.0+511+8a502f20.x86_64 ipa-client-common-4.8.7-12.module_el8.3.0+511+8a502f20.noarch How reproducible: Probably always. Visible in 5 different zones (not yet exposed on the Internet). Steps to Reproduce: 1. Create zone as usual. 2. Enable DNSSEC: ipa dnszone-mod <zonename> --dnssec=true 3. Enable NSEC3: ipa dnszone-mod <zonename> --nsec3param-rec="1 1 10 $(xxd -ps -l8 -u /dev/urandom)" Actual results: 2 KSKs attached to the zone. Expected results: 1 KSK and 1 ZSK attached to the zone. Additional info: Key listing from opendnssec: filippa:~# SOFTHSM2_CONF=/etc/ipa/dnssec/softhsm2.conf ods-enforcer key list -v -z <xxx>.eu Keys: Zone: Keytype: State: Date of next transition: Size: Algorithm: CKA_ID: Repository: KeyTag: <xxx>.eu KSK publish 2021-01-05 08:43:35 3072 8 820cd89ce8c3bc9d191e6f1afc664fe4 SoftHSM 36710 <xxx>.eu ZSK ready 2021-01-05 08:43:35 2048 8 250d09a4724d46676e4b7fe0b77eb9ba SoftHSM 24045 Please note keytypes in the listing above: 1 KSK & 1 ZSK. dig output: filippa:~# dig <xxx>.eu dnskey +short +rrcomments 257 3 8 AwEAAbv1+PERvOibE315J7G0z6X9G/gXzCYQjO53E1jawFy+Jskg/aQ8 A5o5cWlR8ip5z4TLH1qwRUznvbZAWUNi26EqSCLL/oEYLfl8ibexRWip 5i12D1lxPtl4j6rYDUMeLmu7Nmt6uMRyG8FmzwKKmNLG76U4EJTjGgO+ 7xdDzU9U6pppwxJD3RCeuYFHn78pxsNwnEOYo5ICOCXCHuTZw6YWq1oH JY+nuzBhtFlU82T4p2MoqvNlfRjd+85yIgJVImvXpyMLWBTVcgpv1goY nb3wF3LMlWJU8wZVLTXuJjQrXWyfnrATzGe7lKmMRNxhtvGoEXAmRjFP 4auS74Oh1SE= ; KSK; alg = RSASHA256 ; key id = 24046 257 3 8 AwEAAcCeLyVFPsCDR2b8q1cB4O+qPzroVdyN56/SseHPFwHsEXwHqbOD HKWKl8inUc2fDK0rboPP0CrMxxTDWC+JDY4CCqGZcYO8YeIR04BRb9A9 IiCvtWvxBo8qNhLvDGFhFaUHVWIsJfBl+PtkgmbbwGZ6k7JuO1vnxCVc sP9ZvLfFqdj6CeIGhCmISKTZ/iNYIX4hZ1o7NrYhD+o6d+f3v69Q8Q9F 8aTUeG5KwDPlYQMMyI6SxKaSO1lR/8DrCAdn7KOMW6hZmB9b+l5t4RrW /eJ76DlISHGpxZTUkXGRDKah6yGpDK0CyQRa8uUPsQ6WJ3V/xyWF0SJ1 0HRPk3OwgqUm6iSukOdBIgIb6Gfrtxpsi6VkLiq2QDGOFou6RD7F5ddU tvlao+AWrnQ75HqyHvvzjtYHEXTsBCXb+9oWEDi0jfaFlKVeO+xmKKd5 6NuzBAwzSRsgtucxAqjB+IB6Yt8DEW+jaH7J10NUkeMiQEFD/hW26Gsg DdaZIZaLTI2Ihw== ; KSK; alg = RSASHA256 ; key id = 36710 Please note BOTH keys are marked as KSK (both in comments and by keyflags in the first field: 257).
Metadata Update from @frenaud: - Custom field rhbz adjusted to https://bugzilla.redhat.com/show_bug.cgi?id=1912556
Metadata Update from @frenaud: - Issue assigned to frenaud
Metadata Update from @frenaud: - Issue tagged with: test-failure
The test test_integration/test_dnssec.py::TestInstallDNSSECFirst::test_chain_of_trust is also failing while checking the chain of signature using drill command, likely related to this issue. Please see PR #649, test_dnssec.
test_integration/test_dnssec.py::TestInstallDNSSECFirst::test_chain_of_trust
test_dnssec
Metadata Update from @frenaud: - Custom field on_review adjusted to https://github.com/freeipa/freeipa/pull/5444
master:
ipa-4-9:
Metadata Update from @frenaud: - Issue close_status updated to: fixed - Issue status updated to: Closed (was: Open)
ipa-4-8:
Login to comment on this ticket.