> On 2 May 2022, at 12:28, J Doe <gene...@nativemethods.com> wrote:
> 
> On 2022-04-29 01:18, Mark Andrews wrote:
> 
>> break-dnssec is about if the client could detect the re-write or not using 
>> DNSSEC.  If the client has DO=1 in the request and the normal response is 
>> signed then rewrites can be detected. If break-dnssec is ’no’ the rewrite 
>> will be prevented.  If break-dnssec is ‘yes’ then the rewrite will occur.
>> the world <-> recursive server rpz w/ break-dnssec no <-> recursive server 
>> rpz w/ break-dnssec no or yes;
>>                             |                                            |
>>                       non dnssec client                            non 
>> dnssec client
>> You don’t want the second recursive server to spend all its time re-asking 
>> queries that will fail validation
>>> On 29 Apr 2022, at 11:24, J Doe <gene...@nativemethods.com> wrote:
>>> 
>>> Hi,
>>> 
>>> I am configuring an RPZ for a validating resolver.  I read in the BIND 
>>> 9.18.2 ARM that there is a boolean option for RPZ zones called: 
>>> break-dnssec.
>>> 
>>> The ARM states:
>>> 
>>>    ...In that case, RPZ actions are applied regardless of DNSSEC.
>>>    The name of the clause option reflects the fact that results
>>>    rewritten by RPZ actions cannot verify.
>>> 
>>> In my particular scenario, I want to use RPZ to give NXDOMAIN results for 
>>> certain domain names that I don't want accessible.  So for normal queries 
>>> without DNSSEC validation requested and for queries with DNSSEC validation 
>>> requested for a domain name I am _not_ blocking, I want the lookups to work 
>>> (ie: don't validate when validation not requested, validate when validation 
>>> requested).
>>> 
>>> When a client attempts to lookup a domain name that _is_ blocked by RPZ, I 
>>> want the domain name blocked ... whether or not they requested DNSSEC 
>>> validation.
>>> 
>>> Am I correct that: break-dnssec yes comes into play only if a client 
>>> attempts to resolve a DNSSEC secured domain name I _am_ blocking in RPZ ?
>>> 
>>> So for instance...
>>> 
>>> 1. Client requests no validation for example.com which is not in RPZ and 
>>> gets normal result.
>>> 
>>> 2. Client requests validation for example.com which is not in RPZ and gets 
>>> validated result.
>>> 
>>> 3. Client requests no validation for evil.com which is in RPZ and gets 
>>> NXDOMAIN result.
>>> 
>>> 4. Client requests validation for evil.com which is in RPZ and gets 
>>> NXDOMAIN result with broken DNSSEC validation due to rewrite.
>>> 
>>> This would mean that: break-dnssec yes:
>>> 
>>> ...only breaks DNSSEC validation for evil.com because it is re-written
>>> ...does NOT break DNSSEC validation for sites _NOT_ in RPZ that use DNSSEC 
>>> (ie: ietf.org).
>>> 
>>> Is that correct ?
>>> 
>>> Thanks,
>>> 
>>> - J
> 
> Hi Mark,
> 
> Thanks for your reply!  I think I might have done a poor job asking my 
> questions, which may have introduced some confusion - apologies.  My brain is 
> still chewing on this!
> 
> In this particular scenario, I have one validating resolver.  The diagram 
> would be:
> 
> Client (PC, mail server, etc.) -> My resolver -> The world
> 
> What I was wondering is if I configure my validating resolver to use: 
> break-dnssec yes, does that mean that DNSSEC validation is broken for _ALL_ 
> queries ?

No.  Just those that are changed and which where signed and the client asks 
with DO=1 in the EDNS flags.

> I am thinking that this applies only when a client computer queries my 
> validating resolver and wants to know if DNSSEC is valid on a query that my 
> resolver has changed via RPZ.  Because RPZ modified the data it can no longer 
> validate.
> 
> So the client queries my resolver for DNSSEC validity for a server that is 
> _NOT_ covered by my RPZ policy ... validation should _NOT_ break in that 
> circumstance, right ?

yes.

> Thanks,
> 
> - J

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to