Hello,
I followed the manual https://help.directadmin.com/item.php?id=651 for installing DNSSEC.
Previously it worked splendid, and the button/link "generate keys" was added to the DA pannel.
However, I had to do a reinstall. When running the dnssec installer, it told me to add: dnssec-lookaside auto; to named.conf (in the options{} part). So I did...
In the DNS config I see:
DNSSEC - DNS Security (Blue header)
Keys Not yet generated
However, the button generate key, I cannot find.
I tried restarting DA, reinstalling the script, etc... in the DA config on the bottom: dnssec=1 is there...
So, how to get the button "Generate Keys"
Furthermore, if I generate the keys & sign with command line, it all works fine....
Suggestions?
Since I assume named.conf has something to do with it, here it is...
I followed the manual https://help.directadmin.com/item.php?id=651 for installing DNSSEC.
Previously it worked splendid, and the button/link "generate keys" was added to the DA pannel.
However, I had to do a reinstall. When running the dnssec installer, it told me to add: dnssec-lookaside auto; to named.conf (in the options{} part). So I did...
In the DNS config I see:
DNSSEC - DNS Security (Blue header)
Keys Not yet generated
However, the button generate key, I cannot find.
I tried restarting DA, reinstalling the script, etc... in the DA config on the bottom: dnssec=1 is there...
So, how to get the button "Generate Keys"
Furthermore, if I generate the keys & sign with command line, it all works fine....
Suggestions?
Since I assume named.conf has something to do with it, here it is...
Code:
acl "trusted" {
localhost;
127.0.0.1;
# here the IPv4 / IPv6 addresses for AXFR
};
options {
allow-transfer { trusted; };
forwarders { 127.0.0.1; };
listen-on port 53 { 127.0.0.1; #serverIPv4 ADDRESS#; };
listen-on-v6 port 53 { ::1; #serverIPv6 ADDRESS#; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
#allow-query { trusted; };
/*
- If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
- If you are building a RECURSIVE (caching) DNS server, you need to enable
recursion.
- If your recursive DNS server has a public IP address, you MUST enable access
control to limit queries to your legitimate users. Failing to do so will
cause your server to become part of large scale DNS amplification
attacks. Implementing BCP38 within your network would greatly
reduce such attack surface
*/
//recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
pid-file "/run/named/named.pid";
session-keyfile "/run/named/session.key";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
zone "s1.servername.com" { type master; file "/var/named/s1.servername.com.db"; };
zone "somedomain.com" { type master; file "/var/named/somedomain.com.db.signed"; };