Bug ID 1033897: DNSSEC keys generated independently are still in use after GTM sync

Last Modified: Dec 18, 2024

Affected Product(s):
BIG-IP DNS(all modules)

Known Affected Versions:
13.1.4.1, 13.1.5, 13.1.5.1, 14.1.4.3, 14.1.4.4, 14.1.4.5, 14.1.4.6, 14.1.5, 14.1.5.1, 14.1.5.2, 14.1.5.3, 14.1.5.4, 14.1.5.6, 15.1.2.1, 15.1.3, 15.1.3.1, 15.1.4, 15.1.4.1, 15.1.5, 15.1.5.1, 15.1.6, 15.1.6.1, 15.1.7, 15.1.8, 15.1.8.1, 15.1.8.2, 15.1.9, 15.1.9.1, 15.1.10, 15.1.10.2, 15.1.10.3, 15.1.10.4, 15.1.10.5, 15.1.10.6

Opened: Jul 15, 2021

Severity: 3-Major

Symptoms

If GTM sync is broken around DNSSEC key rollover time and two devices generate a DNSSEC key independently, the key is still used for generating a DNSSEC signature after DNS config sync resumes.

Impact

-- TMM continues using the old key for DNSSEC signatures -- Different key in the running config than what is used for generating DNSSEC signatures. -- Possibly invalid DNSSEC data in DNS caching resolvers.

Conditions

-- iQuery connection broken between BIG-IP DNS devices during DNSSEC key rollover -- A DNSSEC key is generated independently on the two affected devices -- iQuery connection re-established, config sync resumes, and the DNSSEC key is overwritten on one device

Workaround

Restart tmm on the affected device: tmsh restart sys service tmm

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips