A container-based hosted DNSSEC service.
- Automate DNSSEC zone signing for AFRINIC Members.
- Deploy a container-based infrastructure using differents approach.
- Test containers schedulers solutions.
- DNSSEC signing using native Docker Compose (PoC).
- Orchestration and scheduling of DNSSEC signing using k8s (PoC).
- DNSSEC signing using Docker Swarm (Staging).
This is the selected choice. We use PowerDNS 4.2.x (require to manipulate TSIGKeys). More details here. For testing, we have deployed authoritative DNS servers (NSD, Bind) as master to the signer (PowerDNS) and Knot as slave for the signer (PowerDNS). More details here.
Three implementations have been tested:
PowerDNS
as signer with other authoritative DNS servers (bind, nsd).dnspython
is used to retrieved signed zone. More details here.OpenDNSSEC
as signer (using DNS adapter) with other authoritative DNS servers (bind, nsd, pdns).knot
is used to retrieved signed zone. See next implementation.- Same as previous one with MySQL backend for OpenDNSSEC Enforcer. More details here.
Two implementations have been tested:
PowerDNS
as signer with MySQL backend. More details hereOpenDNSSEC
as signer (using DNS adapter) with MySQL backend. SinceOpenDNSSEC
did not offer an API, we added aFlask
API that usek8s
Role
andRoleBinding
onpods/exec
resources. This API can then, receive external request and run openDNSSEC related command. More details here
We use private registry to store custom images. More details here