On Sun, 20 Feb 2011, Jan-Piet Mens wrote:

The following queries, and their reply codes: (the order of queries
appears to be irrelevant)

       dig @127.0.0.1 +dnssec test.jpmens.org          -> ANSWER
       dig @127.0.0.1 +dnssec test.jpmens.org ANY      -> ANSWER

       dig @127.0.0.1 +dnssec test.jpmens.org SSHFP    -> SERVFAIL

       dig @127.0.0.1 +dnssec test.jpmens.org SSHFP    -> ANSWER

That worked for me on the first attempt.

;; ANSWER SECTION:
test.jpmens.org.        120     IN      SSHFP   2 1 
C74B4801FD01A68834FF45BACFA114FC3B0C47AA
test.jpmens.org.        120     IN      RRSIG   SSHFP 8 3 120 20110303000000 
20110217000000 50853 jpmens.org. 
TBq2RoNNMkRv5bnesvjUIsIVVi/Yv0WAiB5527r2v8G5kGpJcUks/Y54 
S3ZMc+Ys35EKE+5aQQ7wplioA3Mv59XZu0jeYecQI+Z4sWT4CJyIag9j 
vs97WjGfBshG8GvUqMjRpPwfa0ITGvHcCnVwpDudH2G2hsJz6cOecqqZ kbw=


       dig @127.0.0.1 +dnssec test.jpmens.org A        -> SERVFAIL
       dig @127.0.0.1 +dnssec test.jpmens.org SOA      -> SERVFAIL

Those don't exist? And neither does any NS records?

I've had to disable `harden-referral-path' because the NS RRset for
jpmens.org isn't yet signed.

That should not matter. Hardening just queries multiple name servers for
the same data to make spoofing harder. It does not mandate dnssec.

I think your problem is with your zone?

Paul
_______________________________________________
Unbound-users mailing list
[email protected]
http://unbound.nlnetlabs.nl/mailman/listinfo/unbound-users

Reply via email to