Procedure: Customize Zone Signing Parameters

 

Applies To: Windows Server 2012 R2, Windows Server 2012

Use the following procedures to customize zone signing parameters in preparation to sign a zone with DNSSEC. Procedures are provided using the DNS Manager console and Windows PowerShell. When you have completed the procedures in this topic, return to the parent checklist.

Also see DNS Zones for additional information about zone signing and DNSSEC parameter values.

Choose DNS Manager or Windows PowerShell to customize zone signing parameters:

Customize zone signing parameters in DNS Manager

The Zone Signing Wizard is used to sign a zone in DNS Manager. For examples of the wizard, see Zone Signing Wizard.

Membership in the Administrators group, or equivalent, is the minimum required to complete these procedures. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (https://go.microsoft.com/fwlink/?LinkId=83477).

To customize zone signing parameters in DNS Manager

  1. Open DNS Manager on a primary, authoritative DNS server, or connect to a primary, authoritative DNS server with DNS Manager.

  2. Right-click an unsigned zone, point to DNSSEC, and then click Sign the Zone.

  3. Click Next, on the Signing Options page choose Customize zone signing parameters, and then click Next.

  4. On the Key Master page, choose The DNS server <local server name> is the Key Master if you wish to make the local server the Key Master. If you wish to make a different server the Key Master, choose Select another primary server as the Key Master, and then select a DNS server from the list of available DNS servers.

  5. Click Yes on the alert that is displayed to wait for the local server to build a list of DNS servers that are capable of being the Key Master for this zone. Alternatively, you can type the fully qualified domain name of a DNS server and click Next. If you enter the name of a Key Master manually, you must click Yes when prompted to validate the Key Master.

    Important

    To choose a different DNS server as the Key Master, the local server must be able to contact other primary, authoritative DNS servers that are capable of DNSSEC online signing. The currently signed in user must also have administrative privileges on these DNS servers. If no other DNS servers can be selected as the Key Master, you must choose the local server as the Key Master. The Key Master can be changed after zone signing, if desired.

  6. Click Next to view the first Key Signing Key (KSK) page. Review information on this page and then click Next.

  7. On the second Key Signing Key (KSK) page, click Add to begin configuring KSK parameters.

    Note

    If the zone was previously signed and then unsigned, any KSKs that were used previously are listed and will be used again if they are not removed. You can Add new KSKs, Edit the existing KSKs, or Remove these KSKs.

  8. Enter or select values for all KSK parameters available in the New Key Signing Key (KSK) dialog box. Default parameter values are provided. The Guid parameter is generated automatically. Click OK when finished.

    Note

    At least one KSK is required. You can add additional KSKs if desired. If you select Enable automatic rollover, then a standby KSK is automatically generated to support the double signature rollover method for KSKs. Do not add additional KSKs to support manual rollover. All signing keys that are added in this dialog box will be used during zone signing.

    Important

    To support automatic key rollover, an additional signing key is generated for each ZSK and KSK that is added to the zone. For automatic KSK rollover, only the Double Signature rollover method is supported. For automatic ZSK rollover, only the Pre-publish rollover method is supported.

  9. Click Next to view the first Zone Signing Key (ZSK) page. Review information on this page and then click Next.

  10. On the second Zone Signing Key (ZSK) page, click Add to begin configuring KSK parameters.

    Note

    If the zone was previously signed and then unsigned, any ZSKs that were used previously are listed and will be used again if they are not removed. You can Add new ZSKs, Edit the existing ZSKs, or Remove these ZSKs.

  11. Enter or select values for all ZSK parameters available in the New Zone Signing Key (ZSK) dialog box. Default parameter values are provided. The Guid parameter is generated automatically. Click OK when finished.

    Note

    At least one ZSK is required. You can add additional ZSKs if desired. If you select Enable automatic rollover, then the next ZSK is automatically generated to support the pre-publish rollover method for ZSKs. Do not add additional ZSKs to support manual rollover. All signing keys that are added in this dialog box will be used during zone signing.

  12. Click Next to view the Next Secure (NSEC) page. You can choose NSEC or NSEC3 on this page, and configure NSEC3 parameters.

  13. Click Next to view the Trust Anchors (TAs) page. You can enable distribution of trust anchors and automatic update of trust anchors on this page.

    Tip

    Trust anchors are not required on DNS servers that are authoritative for the zone. You should only enable distribution of trust anchors in the Active Directory forest if other DNS servers running on domain controllers will provide non-authoritative responses for the zone that require DNSSEC validation.

  14. Click Next to view the Signing and Polling Parameters page. You can configure values for DNSSEC signing and polling on this page.

  15. Click Next to view the summary page. You can review current choices for all DNSSEC parameter values on this page. Click Back to configure different parameter values, click Cancel to close the zone signing wizard without signing the zone, or click Next to begin signing the zone.

  16. Verify that The zone has been successfully signed is displayed, and then click Finish.

Customize zone signing parameters in Windows PowerShell

Membership in the Administrators group, or equivalent, is the minimum required to complete these procedures. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (https://go.microsoft.com/fwlink/?LinkId=83477).

Important

To use DNSSEC-related Windows PowerShell cmdlets on a DNS zone, the zone must first be configured with a Key Master. This is automatically done the first time a zone is signed, and the Key Master setting is maintained even if a zone is unsigned later. For this reason, you can use cmdlets like Set-DnsServerDnsSecZoneSetting on unsigned zones provided they were signed at some time in the past. To use this cmdlet on a zone that has never been signed, you must forcibly assign a Key Master server by seizing the role with the Reset-DnsServerZoneKeyMasterRole cmdlet and the SeizeRole parameter.

In the Windows PowerShell examples that are used, replace secure.contoso.com with the name of the zone you wish to sign with DNSSEC. Also replace the example computer names with names of the DNS servers you will use.

To customize zone signing parameters in Windows PowerShell

  1. Open an elevated Windows PowerShell prompt on a primary, authoritative DNS server.

  2. To add a Key Master for the zone, use the Reset-DnsServerZoneKeyMasterRole cmdlet. See the following example.

    PS C:\> Reset-DnsServerZoneKeyMasterRole -ZoneName secure.contoso.com -KeyMasterServer dc2.contoso.com -SeizeRole -Force
    

    In this example, the server dc2.contoso.com is assigned the Key Master role for the secure.contoso.com zone. This step is only required if the zone has never been signed and has not already been assigned a Key Master.

  3. To configure custom zone signing parameters, use the Set-DnsServerDnsSecZoneSetting cmdlet. See the following example.

    Set-DnsServerDnsSecZoneSetting -ZoneName secure.contoso.com -SecureDelegationPollingPeriod 8:00:00
    

    In this example, the SecureDelegationPollingPeriod parameter is set to a custom value. Parameters that are not specified will use default values.

  4. To add a custom KSK, use the Add-DnsServerSigningKey cmdlet. See the following example.

    Add-DnsServerSigningKey -ZoneName secure.contoso.com -Type KeySigningKey -CryptoAlgorithm RsaSha1NSec3 –KeyLength 3072
    

    In this example, the CryptoAlgorithm and KeyLength parameters are set to a custom value. Parameters that are not specified will use default values.

  5. To add a custom ZSK, use the Add-DnsServerSigningKey cmdlet. See the following example.

    Add-DnsServerSigningKey -ZoneName secure.contoso.com -Type ZoneSigningKey -CryptoAlgorithm RsaSha1NSec3
    

    In this example, the CryptoAlgorithm parameter is set to a custom value. Parameters that are not specified will use default values.

  6. To sign the zone with the parameters that have been provided, use the Invoke-DnsServerZoneSign cmdlet. See the following example.

    Invoke-DnsServerZoneSign -ZoneName secure.contoso.com -Force
    

    In this example, the Force parameter is used to skip confirmation and immediately sign the zone.

See also

DNSSEC in Windows

DNSSEC Deployment Planning