This section explains how to test and validate BIND 9 to integrate with CryptoHub for storing the keys used for zone file signing. Before starting this section, install and configure BIND 9 per your specific requirements.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
You must create a zone file before testing can continue. A zone file is a text file used by DNS servers like BIND to define the mappings between domain names and IP addresses for a specific DNS zone. It contains DNS records such asSOA, NS, A, and others that describe the structure and behavior of the domain.
Copy and paste the following text into a file named db.example.com.
None
Generate keys
Perform the following steps by using the pkcs11-tool available from the OpenSC ( github.com/OpenSC/OpenSC) suite to generate keys. On both DEB-based and RPM-based distributions, the package is calledopensc.If you didn’t change the PIN or password for the endpoint, you must copy the password from the
fxpkcs11.cfg file when prompted after running these commands.Generate the following RSA keys on the CryptoHub by usingpkcs11-tool: The KSK and the ZSK. When prompted for the user PIN, enter the password of the identity configured in the Futurex PKCS #11 file,
fxpkcs11.cfg.Each key must have a unique label because later commands use that label to reference the private key.
Shell
Shell
The command output should look similar to the following:
Shell
To convert the RSA keys stored in on CryptoHub into a format that BIND 9 understands, use thednssec-keyfromlabel tool from BIND 9. This process links the raw keys stored in the HSM with**K<zone>+<alg>+<id>
** files that the command generates.The required information is the PKCS #11 label that specifies the token (such as Futurex), the name of the PKCS #11 object (such as label when generating the keys with pkcs11-tool), and the CryptoHub PIN.The private key file is used for DNSSEC signing of the zone as if it were a conventional key on the file system (such as one created with dnssec-keygen). CryptoHub stores the key material (which we cannot extract), and the actual signing takes place on CryptoHub.Run the following command to convert a KSK:Run the following command to convert a ZSK:
Shell
Shell
Sign the zone
The KSK, ZSK, and zone files must be present in the directory from which you run the command.
Before signing, export the following environment variables so that BIND tools can access the HSM:Replace
Shell
your-hsm-pin with the PIN from your fxpkcs11.cfg file.Shell
Shell
If the command succeeds, the output looks similar to the following:The following example shows a successful example directory layout:
Shell

