The manual installation of the Atomia DNS Master server.
Overview
This guide will install the Atomia DNS Master server with the Atomia DNS database on a separate server from the Atomia DNS API.
Installation on Ubuntu 10.04 LTS
- Do a standard installation of Ubuntu 10.04 LTS on two servers.
- Perform the following steps on both servers:
- Add the Atomia APT Repository to the server using:
- Update all packages:
- Assign one of the servers to be the Atomia DNS database server and execute the following steps on that server:
- Install the Atomia DNS database:
- Assign one of the servers to be Atomia DNS API server and execute the following steps on that server:
- Install the Atomia DNS API:
wget -q -O - http://public.apt.atomia.com/setup.sh.shtml | sed s/%distcode/`lsb_release -c | awk '{ print $2 }'`/g | sh
apt-get update
apt-get install atomiadns-database
apt-get install atomiadns-api
Creating the initial DNSSEC keyset
If you want all zones to be signed, then after the Atomia DNS API server is installed you need to create the initial DNSSEC key set. In addition you will need to use a nameserver synchronization agent that supports DNSSEC; at the moment this means the PowerDNS agent.
The DNSSEC setup is completed by executing the following steps:
- Install the command line client:
- Add the active key signing key:
- Add the active zone signing key:
- Add the inactive zone signing key:
apt-get install atomiadns-client
atomiadnsclient --method AddDNSSECKey --arg RSASHA256 --arg 2048 --arg KSK --arg 1
atomiadnsclient --method AddDNSSECKey --arg RSASHA256 --arg 1024 --arg ZSK --arg 1
atomiadnsclient --method AddDNSSECKey --arg RSASHA256 --arg 1024 --arg ZSK --arg 0
Adding DNSSEC keys on a virtual machine where you can’t use keyboard input to generate entropy requires an additional step.
Install rng-tools using apt-get install rng-tools
, then open /etc/default/rng-tools
and add the following line, or better something equivalent but secure:
# WARNING: This setup is insecure, you should make sure that you have an adequate setup # for generating cryptographically strong random numbers instead. HRNGDEVICE = /dev/urandom
Now, they key creation should be instant. Notice though that this setup is really insecure. You should instead configure rng-tools to provide sufficient amounts of random numbers in a secure way, e.g. by having better hardware for generating entropy.