Skip to main content

You're viewing an archived page. It is no longer being updated.

maintkeydb

This content is only available for historical reference.

NAME

maintkeydb - Command line interface to a database containing DNSSEC keys.

SYNOPSIS

        maintkeydb -h
	maintkeydb [-v verbose] [-c configfile] [-i] <commands> <arguments>

The -i switch turns on interactive mode, which is supposed to be more verbose and guide you through the process (more or less current functionality).

With the -h switch a short help is returned.

DESCRIPTION

the interface defines a number of commands:

	create
	delete_name
	delete_id
	list
	rollover
	showkeys
	parentdata
        state

In the interactive mode there are additional commands like "help" and "exit".

The tool is designed with the procedures as documented in [1] in mind.

The basic commands take their own argument, see below.

COMMANDS

Note, in the argument descriptions is a shortcut for <"RSASHA1"|"RSAMD5"|"RSA"|"DSA">

create

 maintkeydb create ["force"]  <"ksk"|"zsk"|"both"> <algorithm> <size> \
	<zone[[ zone],...]>

Create a KSK or ZSK file of given algorithm and size for the specified zones.

If no ZSK exists for a given zone the create function will create two keys, one marked as "active" (i.e. used for "signing"). This allows for the rollover scheme as designed in [1].

If for the given zone and type a key marked as "active" exists the create function will not mark newly created keys as "active".

If "default" is provided as the argument for size than the default sizes from the dnssecmain.conf file are used.

To prevent mistakes that will cause the rollover commands to fail the create method will not create a second KSK or a third ZSK unless the "force" argument is specified.

Return values:

 returns 0 and prints the name of the created key to STDOUT 
 on success

 returns a nonzero vallue and potentionally prints warnings 
 to STDERR.


delete

has two forms:

 maintkeydb delete_id  <zone> <algorithm> <keyID[[ keyID] ...]> 

deletes one or more keys from the specified zone, the keys are identified by the keyID.

 maintkeydb delete_name  <"ksk"|"zsk"|"both">  <algorithm> <zone[[ zone],...]> 

deletes all zsk or all ksk for the given zones. (Be careful with this command, it is very destructive).

Return values:

 returns 0 and prints information  about the deleted keys to STDOUT on
 success


 returns a nonzero value and potentially prints warnings to STDERR on
 error

state

 maintkeydb state  <zone> <algorithm> <keyID[[ keyID] ...]> 

states the active/inactive state of the keys specified by the given keyIDs.

Usage of the state command may cause the database to be altered in such a way that the premises for the rollover commands are not met.

Return values:

 returns 0 on success

 returns a nonzero value and potentially prints warnings to STDERR on
 error

list

  maintkeydb list ["active"|"inactive"|"published"|"rolled"] 
  ["ksk"|"zsk"|"both"] [zone[[ zone],...]]

Lists keys in the database.

Withouth any arguments all keys in the database are returned.

 The output can be filtered to show only active, inactive, published
 or keys that are being rolled.
   
 when one or more zones are specified it only lists the keys for
 those zones.

 when "ksk" or "zsk" is specified only the ksk or zsk keys are
 listed.


Return values:

returns 0 and prints a formated list to STDOUT if keys are found that match the search criterea. The format of the output is a tab seperated list of the following fields name, algorithm, keyid, KSK or ZSK, active or inactive such as:.

 example.com DSA 39372 ZSK active
 example.com RSASHA1 12672 ZSK inactive

returns 1 if no keys are found that match the search criterea

returns a value >1 if an error occurs and potentially prints warnings to STDERR on error

rollover

  mainkeydb rollover <"ksk-stage1"|"ksk-stage1"|"zsk-stage1"|"zsk-stage2"> \
   <algorithm>  <zone[[ zone]...]>

rollovers the zsk or ksk for the specified zones.

The rollover only works in specific circumstances. The premises are tested and if they are not sattisfied for _any_ of the specified zone an error will be printed to STDERR and no rollover will be done for any of the specified zones.

The premises under which rollover succeeds should be obeyed if the user has never used the "create" command with the "force" argument and has never issued "state" or "deleted" for the given zone.

Return values:

 returns 0 on success

 returns a nonzero value and potentially prints warnings to STDERR on
 error


This is an implementation of the "Pre-publish keyset rollover" as documented in [1].

For the rollover of a ZSK the premises is that there is one active and one inactive ZSK. During the rollover the inactive ZSK is made active, the active ZSK is deleted and a new inactive ZSK is created.

This is an implementation of the a double signature scheme keyrollover as documented for KSK rollovers in [1].

The premises for the ksk-stage1 rollover is that there is are one or more active KSK and only one published KSK. The rollover will mark the oldest active KSK as being in "rollover" and make the published keys as active.

The premises of the ksk-stage2 rollover is that there are two or more active KSKs one of wich, the oldest, is marked as being in rollover. During the ksk-stage2 rollover the key marked as being in rollover state will be removed and a new active KSK will be added.

The system does not check for the availability of DS RRs at the parent.

This is what a user would do during a key rollover

Confirm that there is no key currently in rollover state. bash> maintkeydb list rollover example.com (this command returns nothing if there are no keys being rolled)

Nor rollover start the rollover of the KSK key. bash> maintkeydb rollover ksk-stage1 example.com

List the key material and the DS record that needs to be send to the parent.

  bash> maintkeydb showkeys ds example.com
  bash> 
  example.com IN KEY 256 3 5 ( AB12cD...
    ...
  example.com IN DS 1 ab123...  

After the zone is signed with the signing tool that uses the database. And after the zone is published in the DNS the key shown will need to be uploaded to the parent. The user will have to wait untill the DS RR shown is served by the parents server, in this particular example the com zone. Then the user can proceed with:

  bash> maintkeydb list rollover all
  example.com         	RSASHA1	27393	KSK active     (47d04h23m)	(R)


  bash> maintkeydb rollover ksk-stage2 example.com

Now resign and publish the zone in the DNS.

showkeys

   maintkeydb showkey ["ds"] [zone[[ zone],...]]

This command will show the DNSKEY RR set as it will appear in the zone.

If "ds" is specified than only the keysigning keys is printed and in addition the DS RRs which match these.

Note that this command will print all the keysingin keys. If you want to get the data that needs to be forwarded to the parent use the parentdata command instead.

Note that the TTL of these records is set to 0.

Return values:

 returns 0 on success and prints the result to STDOUT

 returns a nonzero value and potentially prints warnings to STDERR on
 error

parentdata

   maintkeydb parentdata <"ds"|"key"|"both"> [zone[[ zone],...]]

Prints the data that will need to be sent to the parent for the zones specified.

The first argument specifies if the DNSKEY RRs, the DS RRs or both need to be printed for each zone.

The output is sorted per zone.

LOGGING

Logging needs improvement, suggestions are welcomed.

Logging is provided through the LOG::Log4perl interface. The logging configuration is read from /usr/local/etc/log4perl.conf, /etc/log4perl.conf or set to the default

    log4perl.rootLogger=FATAL,Screen
    log4perl.appender.Logfile          = Log::Log4perl::Appender::File
    log4perl.appender.Logfile.filename = test.log
    log4perl.appender.Logfile.layout   = Log::Log4perl::Layout::PatternLayout
    log4perl.appender.Logfile.layout.ConversionPattern = [%r] %F %L %m%n

    log4perl.appender.Screen         = Log::Log4perl::Appender::Screen
    log4perl.appender.Screen.stderr  = 0
    log4perl.appender.Screen.layout = Log::Log4perl::Layout::SimpleLayout

Please consult LOG::Log4perl for assistance.

TODO, FEATURES, BUGS.

Zone names that have names that equal arguments in the funtion above such as "ksk", "inactive" may cause parsing problems.

Add a "checkksk" command that will verify if the proper DS is available for a KSK at the parent.

The error messages may be a little pedantic at times.

There is an error saying "You will need to hack the database". We will need recovery procedures written.

REFERENCES

[1] Kolkman and Gieben, "DNSSEC Operational Practices", draft-ietf-dnsop-dnssec-operational-practices-01.txt (work in progress).

COPYRIGHT

COPYRIGHT

Copyright (c) 2004 RIPE NCC. Author Olaf M. Kolkman

All Rights Reserved

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of the author not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.

THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS; IN NO EVENT SHALL AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.