bind.keys revision 1.1.32.1 1 1.1.32.1 pgoyette /* $NetBSD: bind.keys,v 1.1.32.1 2018/03/15 09:11:54 pgoyette Exp $ */
2 1.1 christos # The bind.keys file is used to override the built-in DNSSEC trust anchors
3 1.1 christos # which are included as part of BIND 9. As of the current release, the only
4 1.1 christos # trust anchors it contains are those for the DNS root zone ("."), and for
5 1.1 christos # the ISC DNSSEC Lookaside Validation zone ("dlv.isc.org"). Trust anchors
6 1.1 christos # for any other zones MUST be configured elsewhere; if they are configured
7 1.1 christos # here, they will not be recognized or used by named.
8 1.1 christos #
9 1.1 christos # The built-in trust anchors are provided for convenience of configuration.
10 1.1 christos # They are not activated within named.conf unless specifically switched on.
11 1.1 christos # To use the built-in root key, set "dnssec-validation auto;" in
12 1.1 christos # named.conf options. To use the built-in DLV key, set
13 1.1 christos # "dnssec-lookaside auto;". Without these options being set,
14 1.1 christos # the keys in this file are ignored.
15 1.1 christos #
16 1.1 christos # This file is NOT expected to be user-configured.
17 1.1 christos #
18 1.1.32.1 pgoyette # These keys are current as of February 2017. If any key fails to
19 1.1 christos # initialize correctly, it may have expired. In that event you should
20 1.1 christos # replace this file with a current version. The latest version of
21 1.1 christos # bind.keys can always be obtained from ISC at https://www.isc.org/bind-keys.
22 1.1 christos
23 1.1 christos managed-keys {
24 1.1 christos # ISC DLV: See https://www.isc.org/solutions/dlv for details.
25 1.1.32.1 pgoyette #
26 1.1.32.1 pgoyette # NOTE: The ISC DLV zone is being phased out as of February 2017;
27 1.1.32.1 pgoyette # the key will remain in place but the zone will be otherwise empty.
28 1.1.32.1 pgoyette # Configuring "dnssec-lookaside auto;" to activate this key is
29 1.1.32.1 pgoyette # harmless, but is no longer useful and is not recommended.
30 1.1 christos dlv.isc.org. initial-key 257 3 5 "BEAAAAPHMu/5onzrEE7z1egmhg/WPO0+juoZrW3euWEn4MxDCE1+lLy2
31 1.1 christos brhQv5rN32RKtMzX6Mj70jdzeND4XknW58dnJNPCxn8+jAGl2FZLK8t+
32 1.1 christos 1uq4W+nnA3qO2+DL+k6BD4mewMLbIYFwe0PG73Te9fZ2kJb56dhgMde5
33 1.1 christos ymX4BI/oQ+cAK50/xvJv00Frf8kw6ucMTwFlgPe+jnGxPPEmHAte/URk
34 1.1 christos Y62ZfkLoBAADLHQ9IrS2tryAe7mbBZVcOwIeU/Rw/mRx/vwwMCTgNboM
35 1.1 christos QKtUdvNXDrYJDSHZws3xiRXF1Rf+al9UmZfSav/4NWLKjHzpT59k/VSt
36 1.1 christos TDN0YUuWrBNh";
37 1.1 christos
38 1.1.32.1 pgoyette # ROOT KEYS: See https://data.iana.org/root-anchors/root-anchors.xml
39 1.1 christos # for current trust anchor information.
40 1.1.32.1 pgoyette #
41 1.1.32.1 pgoyette # These keys are activated by setting "dnssec-validation auto;"
42 1.1.32.1 pgoyette # in named.conf.
43 1.1.32.1 pgoyette #
44 1.1.32.1 pgoyette # This key (19036) is to be phased out starting in 2017. It will
45 1.1.32.1 pgoyette # remain in the root zone for some time after its successor key
46 1.1.32.1 pgoyette # has been added. It will remain this file until it is removed from
47 1.1.32.1 pgoyette # the root zone.
48 1.1 christos . initial-key 257 3 8 "AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjF
49 1.1 christos FVQUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoX
50 1.1 christos bfDaUeVPQuYEhg37NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaD
51 1.1 christos X6RS6CXpoY68LsvPVjR0ZSwzz1apAzvN9dlzEheX7ICJBBtuA6G3LQpz
52 1.1 christos W5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7OyQdXfZ57relS
53 1.1 christos Qageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulq
54 1.1 christos QxA+Uk1ihz0=";
55 1.1.32.1 pgoyette
56 1.1.32.1 pgoyette # This key (20326) is to be published in the root zone in 2017.
57 1.1.32.1 pgoyette # Servers which were already using the old key (19036) should
58 1.1.32.1 pgoyette # roll seamlessly to this new one via RFC 5011 rollover. Servers
59 1.1.32.1 pgoyette # being set up for the first time can use the contents of this
60 1.1.32.1 pgoyette # file as initializing keys; thereafter, the keys in the
61 1.1.32.1 pgoyette # managed key database will be trusted and maintained
62 1.1.32.1 pgoyette # automatically.
63 1.1.32.1 pgoyette . initial-key 257 3 8 "AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3
64 1.1.32.1 pgoyette +/4RgWOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kv
65 1.1.32.1 pgoyette ArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF
66 1.1.32.1 pgoyette 0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+e
67 1.1.32.1 pgoyette oZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfd
68 1.1.32.1 pgoyette RUfhHdY6+cn8HFRm+2hM8AnXGXws9555KrUB5qihylGa8subX2Nn6UwN
69 1.1.32.1 pgoyette R1AkUTV74bU=";
70 1.1 christos };
71