Hi Florian,

On 27/02/2023 17:33, Paul Wouters via Unbound-users wrote:
On Mon, 27 Feb 2023, Florian Streibelt via Unbound-users wrote:

No, again that is not my issue.

All of the servers that dns.com operates are dropping queries for the Ressource Record Type DS.

They are the authoritative servers for dns.com as well as for the parent zone of the zone our customer wants to resolve and the zone itself.

We are providing recursion for our customer.

Then if they do not respond properly for DS records or with proof of
non-existence, then that implementation is broken and there is not much
you can do. But this means they should also fail to work for google dns
on 8.8.8.8, or on quad9 at 9.9.9.9. That is, your customer should really
move their domain elsewhere.

Perhaps you can try a local override, eg:


local-zone: <your-parentzone> ds always_nxdomain
local-zone: <your-customerzone> ds always_nxdomain

But I don't really know if that will work.
What could work would be:
        local-zone: <your-parentzone> typetransparent
        local-data: "<your-customerzone> IN DS <ds-data>"
        domain-insecure: <your-customerzone>

These are DS answers to the clients.
You would need to provide fake DS data though, not sure if that is desirable and how that would break the clients that ask for it. If the zones do not do DNSSEC in the first place (so there is no chain to break) you could try that.

Best regards,
-- Yorgos


Another option might be to run an unbound instance with val-permissive-mode=yes
and then on your regular resolver, use a forward-zone: for your
parentzone and customer zone to that unbound instance.

Paul

Reply via email to