break-dnssec is about if the client could detect the re-write or not using 
DNSSEC.  If the client has DO=1 in the request and the normal response is 
signed then rewrites can be detected. If break-dnssec is ’no’ the rewrite will 
be prevented.  If break-dnssec is ‘yes’ then the rewrite will occur.


the world <-> recursive server rpz w/ break-dnssec no <-> recursive server rpz 
w/ break-dnssec no or yes;
                            |                                            |
                      non dnssec client                            non dnssec 
client

You don’t want the second recursive server to spend all its time re-asking 
queries that will fail validation

> On 29 Apr 2022, at 11:24, J Doe <gene...@nativemethods.com> wrote:
> 
> Hi,
> 
> I am configuring an RPZ for a validating resolver.  I read in the BIND 9.18.2 
> ARM that there is a boolean option for RPZ zones called: break-dnssec.
> 
> The ARM states:
> 
>    ...In that case, RPZ actions are applied regardless of DNSSEC.
>    The name of the clause option reflects the fact that results
>    rewritten by RPZ actions cannot verify.
> 
> In my particular scenario, I want to use RPZ to give NXDOMAIN results for 
> certain domain names that I don't want accessible.  So for normal queries 
> without DNSSEC validation requested and for queries with DNSSEC validation 
> requested for a domain name I am _not_ blocking, I want the lookups to work 
> (ie: don't validate when validation not requested, validate when validation 
> requested).
> 
> When a client attempts to lookup a domain name that _is_ blocked by RPZ, I 
> want the domain name blocked ... whether or not they requested DNSSEC 
> validation.
> 
> Am I correct that: break-dnssec yes comes into play only if a client attempts 
> to resolve a DNSSEC secured domain name I _am_ blocking in RPZ ?
> 
> So for instance...
> 
> 1. Client requests no validation for example.com which is not in RPZ and gets 
> normal result.
> 
> 2. Client requests validation for example.com which is not in RPZ and gets 
> validated result.
> 
> 3. Client requests no validation for evil.com which is in RPZ and gets 
> NXDOMAIN result.
> 
> 4. Client requests validation for evil.com which is in RPZ and gets NXDOMAIN 
> result with broken DNSSEC validation due to rewrite.
> 
> This would mean that: break-dnssec yes:
> 
> ...only breaks DNSSEC validation for evil.com because it is re-written
> ...does NOT break DNSSEC validation for sites _NOT_ in RPZ that use DNSSEC 
> (ie: ietf.org).
> 
> Is that correct ?
> 
> Thanks,
> 
> - J
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to