Skip to content

Commit 9bb4626

Browse files
committed
remove /etc/bind.keys
the built-in trust anchors in named and delv are sufficent for validation. named still needs to be able to load trust anchors from a bind.keys file for testing purposes, but it doesn't need to be the default behavior. we now only load trust anchors from a file if explicitly specified via the "bindkeys-file" option in named or the "-a" command line argument to delv. documentation has been cleaned up to remove references to /etc/bind.keys. Closes #3850.
1 parent f291b77 commit 9bb4626

20 files changed

+122
-159
lines changed

Makefile.am

+1-2
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,10 @@ CLEANFILES = bind.keys.h
1212
bind.keys.h: bind.keys Makefile
1313
${PERL} ${top_srcdir}/util/bindkeys.pl ${top_srcdir}/bind.keys > $@
1414

15-
dist_sysconf_DATA = bind.keys
16-
1715
.PHONY: doc
1816

1917
EXTRA_DIST = \
18+
bind.keys \
2019
util/bindkeys.pl \
2120
contrib \
2221
CHANGES \

Makefile.docs

-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ LF = \n
1414
RNDC_CONF = .. |rndc_conf| replace:: ``$(sysconfdir)/rndc.conf``
1515
RNDC_KEY = .. |rndc_key| replace:: ``$(sysconfdir)/rndc.key``
1616
NAMED_CONF = .. |named_conf| replace:: ``$(sysconfdir)/named.conf``
17-
BIND_KEYS = .. |bind_keys| replace:: ``$(sysconfdir)/bind.keys``
1817
NAMED_PID = .. |named_pid| replace:: ``$(runstatedir)/named.pid``
1918
SESSION_KEY = .. |session_key| replace:: ``$(runstatedir)/session.key``
2019

bin/check/named-checkconf.rst

+5-4
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,11 @@ errors. If no file is specified,
3232
|named_conf| is read by default.
3333

3434
Note: files that :iscman:`named` reads in separate parser contexts, such as
35-
``rndc.key`` and ``bind.keys``, are not automatically read by
36-
:program:`named-checkconf`. Configuration errors in these files may cause
37-
:iscman:`named` to fail to run, even if :program:`named-checkconf` was successful.
38-
However, :program:`named-checkconf` can be run on these files explicitly.
35+
``rndc.conf`` or ``rndc.key``, are not automatically read by
36+
:program:`named-checkconf`. Configuration errors in these files may cause
37+
:iscman:`named` to fail to run, even if :program:`named-checkconf` was
38+
successful. However, :program:`named-checkconf` can be run on these files
39+
explicitly.
3940

4041
Options
4142
~~~~~~~

bin/delv/delv.c

+7-17
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ static dns_name_t *anchor_name = NULL;
125125
static dns_master_style_t *style = NULL;
126126
static dns_fixedname_t qfn;
127127

128-
/* Default bind.keys contents */
128+
/* Default trust anchors */
129129
static char anchortext[] = TRUST_ANCHORS;
130130

131131
/*
@@ -812,16 +812,11 @@ setup_dnsseckeys(dns_client_t *client) {
812812
const cfg_obj_t *managed_keys = NULL;
813813
const cfg_obj_t *trust_anchors = NULL;
814814
cfg_obj_t *bindkeys = NULL;
815-
const char *filename = anchorfile;
816815

817816
if (!root_validation) {
818817
return (ISC_R_SUCCESS);
819818
}
820819

821-
if (filename == NULL) {
822-
filename = SYSCONFDIR "/bind.keys";
823-
}
824-
825820
if (trust_anchor == NULL) {
826821
trust_anchor = isc_mem_strdup(mctx, ".");
827822
}
@@ -832,22 +827,17 @@ setup_dnsseckeys(dns_client_t *client) {
832827

833828
CHECK(cfg_parser_create(mctx, dns_lctx, &parser));
834829

835-
if (access(filename, R_OK) != 0) {
836-
if (anchorfile != NULL) {
830+
if (anchorfile != NULL) {
831+
if (access(anchorfile, R_OK) != 0) {
837832
fatal("Unable to read key file '%s'", anchorfile);
838833
}
839-
} else {
840-
result = cfg_parse_file(parser, filename, &cfg_type_bindkeys,
834+
835+
result = cfg_parse_file(parser, anchorfile, &cfg_type_bindkeys,
841836
&bindkeys);
842837
if (result != ISC_R_SUCCESS) {
843-
if (anchorfile != NULL) {
844-
fatal("Unable to load keys from '%s'",
845-
anchorfile);
846-
}
838+
fatal("Unable to load keys from '%s'", anchorfile);
847839
}
848-
}
849-
850-
if (bindkeys == NULL) {
840+
} else {
851841
isc_buffer_t b;
852842

853843
isc_buffer_init(&b, anchortext, sizeof(anchortext) - 1);

bin/delv/delv.rst

+15-16
Original file line numberDiff line numberDiff line change
@@ -102,20 +102,21 @@ Options
102102

103103
.. option:: -a anchor-file
104104

105-
This option specifies a file from which to read DNSSEC trust anchors. The default
106-
is |bind_keys|, which is included with BIND 9 and contains one
107-
or more trust anchors for the root zone (".").
108-
109-
Keys that do not match the root zone name are ignored. An alternate
110-
key name can be specified using the :option:`+root` option.
111-
112-
Note: When reading the trust anchor file, :program:`delv` treats ``trust-anchors``,
113-
``initial-key``, and ``static-key`` identically. That is, for a managed key,
114-
it is the *initial* key that is trusted; :rfc:`5011` key management is not
115-
supported. :program:`delv` does not consult the managed-keys database maintained by
116-
:iscman:`named`, which means that if either of the keys in |bind_keys| is
117-
revoked and rolled over, |bind_keys| must be updated to
118-
use DNSSEC validation in :program:`delv`.
105+
This option specifies a file from which to read an alternate
106+
DNSSEC root zone trust anchor.
107+
108+
By default, keys that do not match the root zone name (`.`) are
109+
ignored. If an alternate key name is desired, it can be
110+
specified using the :option:`+root` option.
111+
112+
Note: When reading trust anchors, :program:`delv` treats
113+
``trust-anchors``, ``initial-key``, and ``static-key`` identically. That
114+
is, for a managed key, it is the *initial* key that is trusted;
115+
:rfc:`5011` key management is not supported. :program:`delv` does not
116+
consult the managed-keys database maintained by :iscman:`named`. This
117+
means that if the default key built in to :program:`delv` is revoked,
118+
:program:`delv` must be updated to a newer version in order to continue
119+
validating.
119120

120121
.. option:: -b address
121122

@@ -354,8 +355,6 @@ assign values to options like the timeout interval. They have the form
354355
Files
355356
~~~~~
356357

357-
|bind_keys|
358-
359358
``/etc/resolv.conf``
360359

361360
See Also

bin/named/config.c

-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,6 @@ static char defaultconf[] = "\
4949
options {\n\
5050
answer-cookie true;\n\
5151
automatic-interface-scan yes;\n\
52-
bindkeys-file \"" NAMED_SYSCONFDIR "/bind.keys\";\n\
5352
# blackhole {none;};\n\
5453
cookie-algorithm siphash24;\n\
5554
# directory <none>\n\

bin/named/include/named/globals.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ EXTERN unsigned int named_g_debuglevel INIT(0);
9797
EXTERN cfg_obj_t *named_g_config INIT(NULL);
9898
EXTERN const cfg_obj_t *named_g_defaults INIT(NULL);
9999
EXTERN const char *named_g_conffile INIT(NAMED_SYSCONFDIR "/named.conf");
100-
EXTERN const char *named_g_defaultbindkeys INIT(NAMED_SYSCONFDIR "/bind.keys");
100+
EXTERN const char *named_g_defaultbindkeys INIT(NULL);
101101
EXTERN const char *named_g_keyfile INIT(NAMED_SYSCONFDIR "/rndc.key");
102102

103103
EXTERN dns_tsigkey_t *named_g_sessionkey INIT(NULL);

bin/named/main.c

-1
Original file line numberDiff line numberDiff line change
@@ -667,7 +667,6 @@ printversion(bool verbose) {
667667
printf("default paths:\n");
668668
printf(" named configuration: %s\n", named_g_conffile);
669669
printf(" rndc configuration: %s\n", rndcconf);
670-
printf(" DNSSEC root key: %s\n", named_g_defaultbindkeys);
671670
printf(" nsupdate session key: %s\n", named_g_defaultsessionkeyfile);
672671
printf(" named PID file: %s\n", named_g_defaultpidfile);
673672
printf(" named lock file: %s\n", named_g_defaultlockfile);

bin/named/server.c

+37-35
Original file line numberDiff line numberDiff line change
@@ -8510,45 +8510,45 @@ load_configuration(const char *filename, named_server_t *server,
85108510
#endif
85118511

85128512
/*
8513-
* If bind.keys exists, load it. If "dnssec-validation auto"
8514-
* is turned on, the root key found there will be used as a
8515-
* default trust anchor.
8513+
* If "dnssec-validation auto" is turned on, the root key
8514+
* will be used as a default trust anchor. The root key
8515+
* is built in, but if bindkeys-file is set, then it will
8516+
* be overridden with the key in that file.
85168517
*/
85178518
obj = NULL;
8518-
result = named_config_get(maps, "bindkeys-file", &obj);
8519-
INSIST(result == ISC_R_SUCCESS);
8520-
setstring(server, &server->bindkeysfile, cfg_obj_asstring(obj));
8521-
INSIST(server->bindkeysfile != NULL);
8522-
8523-
if (access(server->bindkeysfile, R_OK) == 0) {
8524-
isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
8525-
NAMED_LOGMODULE_SERVER, ISC_LOG_INFO,
8526-
"reading built-in trust anchors "
8527-
"from file '%s'",
8528-
server->bindkeysfile);
8529-
8530-
result = cfg_parser_create(named_g_mctx, named_g_lctx,
8531-
&bindkeys_parser);
8532-
if (result != ISC_R_SUCCESS) {
8533-
goto cleanup_config;
8534-
}
8535-
8536-
result = cfg_parse_file(bindkeys_parser, server->bindkeysfile,
8537-
&cfg_type_bindkeys, &bindkeys);
8538-
if (result != ISC_R_SUCCESS) {
8519+
(void)named_config_get(maps, "bindkeys-file", &obj);
8520+
if (obj != NULL) {
8521+
setstring(server, &server->bindkeysfile, cfg_obj_asstring(obj));
8522+
INSIST(server->bindkeysfile != NULL);
8523+
if (access(server->bindkeysfile, R_OK) != 0) {
85398524
isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
85408525
NAMED_LOGMODULE_SERVER, ISC_LOG_INFO,
8541-
"unable to parse '%s' error '%s'; using "
8542-
"built-in keys instead",
8543-
server->bindkeysfile,
8544-
isc_result_totext(result));
8526+
"unable to open '%s'; using built-in "
8527+
"keys instead",
8528+
server->bindkeysfile);
8529+
} else {
8530+
result = cfg_parser_create(named_g_mctx, named_g_lctx,
8531+
&bindkeys_parser);
8532+
if (result != ISC_R_SUCCESS) {
8533+
goto cleanup_config;
8534+
}
8535+
8536+
result = cfg_parse_file(bindkeys_parser,
8537+
server->bindkeysfile,
8538+
&cfg_type_bindkeys, &bindkeys);
8539+
if (result != ISC_R_SUCCESS) {
8540+
isc_log_write(
8541+
named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
8542+
NAMED_LOGMODULE_SERVER, ISC_LOG_INFO,
8543+
"unable to parse '%s' "
8544+
"error '%s'; using "
8545+
"built-in keys instead",
8546+
server->bindkeysfile,
8547+
isc_result_totext(result));
8548+
}
85458549
}
85468550
} else {
8547-
isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
8548-
NAMED_LOGMODULE_SERVER, ISC_LOG_INFO,
8549-
"unable to open '%s'; using built-in keys "
8550-
"instead",
8551-
server->bindkeysfile);
8551+
setstring(server, &server->bindkeysfile, NULL);
85528552
}
85538553

85548554
/*
@@ -10270,7 +10270,6 @@ named_server_create(isc_mem_t *mctx, named_server_t **serverp) {
1027010270
*server = (named_server_t){
1027110271
.mctx = mctx,
1027210272
.statsfile = isc_mem_strdup(mctx, "named.stats"),
10273-
.bindkeysfile = isc_mem_strdup(mctx, named_g_defaultbindkeys),
1027410273
.dumpfile = isc_mem_strdup(mctx, "named_dump.db"),
1027510274
.secrootsfile = isc_mem_strdup(mctx, "named.secroots"),
1027610275
.recfile = isc_mem_strdup(mctx, "named.recursing"),
@@ -10382,11 +10381,14 @@ named_server_destroy(named_server_t **serverp) {
1038210381
}
1038310382

1038410383
isc_mem_free(server->mctx, server->statsfile);
10385-
isc_mem_free(server->mctx, server->bindkeysfile);
1038610384
isc_mem_free(server->mctx, server->dumpfile);
1038710385
isc_mem_free(server->mctx, server->secrootsfile);
1038810386
isc_mem_free(server->mctx, server->recfile);
1038910387

10388+
if (server->bindkeysfile != NULL) {
10389+
isc_mem_free(server->mctx, server->bindkeysfile);
10390+
}
10391+
1039010392
if (server->version != NULL) {
1039110393
isc_mem_free(server->mctx, server->version);
1039210394
}

doc/arm/conf.py

-1
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,6 @@ def setup(app):
184184
.. |rndc_conf| replace:: ``/etc/rndc.conf``
185185
.. |rndc_key| replace:: ``/etc/rndc.key``
186186
.. |named_conf| replace:: ``/etc/named.conf``
187-
.. |bind_keys| replace:: ``/etc/bind.keys``
188187
.. |named_pid| replace:: ``/run/named.pid``
189188
.. |session_key| replace:: ``/run/session.key``
190189
"""

doc/arm/reference.rst

+21-33
Original file line numberDiff line numberDiff line change
@@ -1323,7 +1323,7 @@ default is used.
13231323
found when performing a dynamic update of secure zones, if different
13241324
than the current working directory. (Note that this option has no
13251325
effect on the paths for files containing non-DNSSEC keys such as
1326-
``bind.keys``, ``rndc.key``, or ``session.key``.)
1326+
``rndc.key``, or ``session.key``.)
13271327

13281328
.. namedconf:statement:: lmdb-mapsize
13291329
:tags: server
@@ -1515,7 +1515,7 @@ default is used.
15151515

15161516
This is the pathname of a file to override the built-in trusted keys provided
15171517
by :iscman:`named`. See the discussion of :any:`dnssec-validation` for
1518-
details. If not specified, the default is |bind_keys|.
1518+
details. This is intended for server testing.
15191519

15201520
.. namedconf:statement:: secroots-file
15211521
:tags: dnssec
@@ -2609,32 +2609,19 @@ Boolean Options
26092609
:any:`managed-keys` or :any:`trusted-keys` statements, both deprecated). If
26102610
there is no configured trust anchor, validation does not take place.
26112611

2612-
If set to ``no``, DNSSEC validation is disabled.
2612+
If set to ``no``, DNSSEC validation is disabled. (Note: the resolver
2613+
will still set the DO bit in outgoing queries indicating that it can
2614+
accept DNSSEC responses, even if :any:`dnssec-validation` is disabled.)
26132615

26142616
The default is ``auto``, unless BIND is built with
26152617
``configure --disable-auto-validation``, in which case the default is
26162618
``yes``.
26172619

2618-
The default root trust anchor is stored in the file ``bind.keys``.
2619-
:iscman:`named` loads that key at startup if :any:`dnssec-validation` is
2620-
set to ``auto``. A copy of the file is installed along with BIND 9,
2621-
and is current as of the release date. If the root key expires, a new
2622-
copy of ``bind.keys`` can be downloaded from
2623-
https://www.isc.org/bind-keys.
2624-
2625-
(To prevent problems if ``bind.keys`` is not found, the current trust
2626-
anchor is also compiled in :iscman:`named`. Relying on this is not
2627-
recommended, however, as it requires :iscman:`named` to be recompiled with
2628-
a new key when the root key expires.)
2629-
2630-
.. note:: :iscman:`named` loads *only* the root key from ``bind.keys``. The file
2631-
cannot be used to store keys for other zones. The root key in
2632-
``bind.keys`` is ignored if ``dnssec-validation auto`` is not in
2633-
use.
2634-
2635-
Whenever the resolver sends out queries to an EDNS-compliant
2636-
server, it always sets the DO bit indicating it can support DNSSEC
2637-
responses, even if :any:`dnssec-validation` is off.
2620+
The default root trust anchor is compiled into :iscman:`named`
2621+
and is current as of the release date. If the root key changes, a
2622+
running BIND server will detect this and roll smoothly to the new
2623+
key, but newly-installed servers will be unable to start validation,
2624+
so BIND must be upgraded to a newer version.
26382625

26392626
.. namedconf:statement:: validate-except
26402627
:tags: dnssec
@@ -6164,10 +6151,11 @@ simply moves on. The key specified in the :any:`trust-anchors` statement is
61646151
not used to validate answers; it is superseded by the key or keys stored
61656152
in the managed-keys database.
61666153

6167-
The next time :iscman:`named` runs after an ``initial-key`` or ``initial-ds`` has been *removed*
6168-
from the :any:`trust-anchors` statement (or changed to a ``static-key`` or ``static-ds``), the
6169-
corresponding zone is removed from the managed-keys database, and
6170-
:rfc:`5011` key maintenance is no longer used for that domain.
6154+
The next time :iscman:`named` runs after an ``initial-key`` or
6155+
``initial-ds`` has been *removed* from the :any:`trust-anchors` statement
6156+
(or changed to a ``static-key`` or ``static-ds``), the corresponding zone
6157+
is removed from the managed-keys database, and :rfc:`5011` key maintenance
6158+
is no longer used for that domain.
61716159

61726160
In the current implementation, the managed-keys database is stored as a
61736161
master-format zone file.
@@ -6189,12 +6177,12 @@ others, the working directory should be always be writable by
61896177
:iscman:`named`.)
61906178

61916179
If the :any:`dnssec-validation` option is set to ``auto``, :iscman:`named`
6192-
automatically initializes an ``initial-key`` for the root zone. The key
6193-
that is used to initialize the key-maintenance process is stored in
6194-
``bind.keys``; the location of this file can be overridden with the
6195-
:any:`bindkeys-file` option. As a fallback in the event no ``bind.keys``
6196-
can be found, the initializing key is also compiled directly into
6197-
:iscman:`named`.
6180+
automatically sets up an ``initial-key`` for the root zone. This
6181+
initializing key is built in to :iscman:`named`, and is current as of the
6182+
release date. When the root zone key changes, a running server will detect
6183+
the change and roll to the new key, but newly-installed servers being run
6184+
for the first time will need to be from a recent enough version of BIND to
6185+
have been built with the current key.
61986186

61996187
:any:`dnssec-policy` Block Grammar
62006188
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

doc/dnssec-guide/troubleshooting.rst

-1
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,6 @@ reload`` with the key files missing from the key directory:
422422

423423
named[32516]: received control channel command 'reload'
424424
named[32516]: loading configuration from '/etc/bind/named.conf'
425-
named[32516]: reading built-in trusted keys from file '/etc/bind/bind.keys'
426425
named[32516]: using default UDP/IPv4 port range: [1024, 65535]
427426
named[32516]: using default UDP/IPv6 port range: [1024, 65535]
428427
named[32516]: sizing zone task pool based on 6 zones

0 commit comments

Comments
 (0)