DNSSEC is designed to be validated in the application. That applies equally to 
internal zones as it does to external zones. One procedure for them all. 

-- 
Mark Andrews

> On 1 Aug 2022, at 11:15, John W. Blue via bind-users 
> <bind-users@lists.isc.org> wrote:
> 
> 
> As some enterprise networks begin to engineer towards the concepts of 
> ZeroTrust, one item caught me unaware:  PM’s asking for the DNSSEC signing of 
> an internal zone.
>  
> Granted, it has long been considered unwise by DNS pro’s with a commonly 
> stated reason that it increasing the size of the zone yadda, yadda, yadda.
>  
> While that extra overhead is true, it is more accurate to say that if 
> internal clients are talking directly to an authoritative server the AD flag 
> will not be set.  You will only get the AA flag.  So there is nothing to be 
> gained from signing an internal zone.
>  
> However, I have not tested it yet, I would assume that if a non-authoritative 
> internal server was queried it would be able to walk the chain of trust and 
> return AD.
>  
> Thoughts?
>  
> John
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to