On 24. 09. 22 11:20, Bjørn Mork wrote:
Philip Prindeville <philipp_s...@redfish-solutions.com> writes:

How many ISP's squelch DNSSEC like that?  I hope it's not a common practice!

More common than you'd like to think.  See Geoff's excellent world map
at https://stats.labs.apnic.net/dnssec

Note that no validation implies no signatures for downstream resolvers.
Which makes the non-validating resolvers useless in a forwarder
statements, like you discovered.  And useless in many other situations
as well.  You can't do DANE for example.

Please allow me to correct this:

named.conf statement 'dnssec-enabled yes;' allows forwarding DNSSEC signatures (and other metadata) without validating them.

named.conf statement 'dnssec-validation auto;' then enables DNSSEC validation itself.

In other words, it is possible to allow DNSSEC to work for forwarders without doing validation itself. If the ISP in question resists enabling DNSSEC then at least 'dnssec-enabled yes; dnssec-validation no;' configuration would improve situation for people who care.

--
Petr Špaček
Internet Systems Consortium
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to