<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Dnssec on Apuntes de root</title>
    <link>https://blog.099c.org/tags/dnssec/</link>
    <description>Recent content in Dnssec on Apuntes de root</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <managingEditor>jorti@pm.me (Juan Orti Alcaine)</managingEditor>
    <webMaster>jorti@pm.me (Juan Orti Alcaine)</webMaster>
    <lastBuildDate>Tue, 28 Jul 2015 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.099c.org/tags/dnssec/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>OpenDNSSEC</title>
      <link>https://blog.099c.org/posts/opendnssec/</link>
      <pubDate>Tue, 28 Jul 2015 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/opendnssec/</guid>
      <description>&lt;p&gt;A quick guide about how to migrate a signed zone from dnssec-tools to OpenDNSSEC.&lt;/p&gt;</description>
    </item>
    <item>
      <title>dnssec-tools and bind authoritative name server in Fedora</title>
      <link>https://blog.099c.org/posts/dnssec-tools-and-bind-authoritative-name-server-in-fedora/</link>
      <pubDate>Mon, 30 Sep 2013 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/dnssec-tools-and-bind-authoritative-name-server-in-fedora/</guid>
      <description>&lt;p&gt;Some time ago, I wrote a &lt;a href=&#34;https://blog.099c.org/posts/bind-authoritative-name-server-with-dnssec-in-centos-6/&#34;&gt;post&lt;/a&gt; about using dnssec-tools for managing an authoritative name server in CentOS, now I&amp;rsquo;m going to extend it to cover their usage in a Fedora system.&lt;/p&gt;&#xA;&lt;p&gt;First of all, I&amp;rsquo;m going to use the latest versions which currently is not in the repositories. Download the source rpm, recompile and install the rpms: &lt;code&gt;$ mock -r fedora-19-x86_64 dnssec-tools-2.0-1.fc18.src.rpm # yum install /var/lib/mock/fedora-19-x86_64/result/*rpm&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;The configuration of bind as authoritative name server &lt;code&gt;/etc/named.conf&lt;/code&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bind authoritative name server with DNSSEC in CentOS 6</title>
      <link>https://blog.099c.org/posts/bind-authoritative-name-server-with-dnssec-in-centos-6/</link>
      <pubDate>Thu, 09 May 2013 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/bind-authoritative-name-server-with-dnssec-in-centos-6/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m going to explain how to implement DNSSEC in CentOS, using Bind as authoritative name server and the &lt;a href=&#34;http://www.dnssec-tools.org/&#34; title=&#34;dnssec-tools&#34;&gt;dnssec-tools&lt;/a&gt; utilities. To deploy DNSSEC, your parent zone must be signed, you can check it &lt;a href=&#34;http://stats.research.icann.org/dns/tld_report/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;The main reference for this post is in the dnssec-tools Wiki: &lt;a href=&#34;https://www.dnssec-tools.org/wiki/index.php/Authoritative_Server&#34; title=&#34;DNSSEC tools authoritative name server&#34;&gt;https://www.dnssec-tools.org/wiki/index.php/Authoritative_Server&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Configure Unbound DNSSEC resolver in OpenWrt</title>
      <link>https://blog.099c.org/posts/configure-unbound-dnssec-resolver-in-openwrt/</link>
      <pubDate>Thu, 20 Dec 2012 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/configure-unbound-dnssec-resolver-in-openwrt/</guid>
      <description>&lt;p&gt;After realizing that my ISP (ONO) was hijacking the NXDOMAIN DNS responses, I decided to improve the security of the DNS queries for my entire LAN using &lt;a href=&#34;https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions&#34; title=&#34;DNSSEC&#34;&gt;DNSSEC&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;I choosed to replace &lt;a href=&#34;http://www.thekelleys.org.uk/dnsmasq/doc.html&#34; title=&#34;dnsmasq&#34;&gt;dnsmasq&lt;/a&gt; for &lt;a href=&#34;https://unbound.net/&#34; title=&#34;unbound&#34;&gt;unbound&lt;/a&gt; in my OpenWrt router. These are the steps I followed.&lt;/p&gt;&#xA;&lt;p&gt;First I installed the required packages:&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;# opkg update # opkg install unbound unbound-anchor unbound-control unbound-control-setup unbound-host&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;As dnsmasq is also the DHCP server, I&amp;rsquo;m not going to disable it, only change the DNS port to 5353. In &lt;code&gt;/etc/config/dhcp&lt;/code&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
