On Jan 11, 2014, at 5:00 PM, Rick van Rein <[email protected]> wrote:

> Hello,
> 
> Am I correct that Unbound cannot require DNSSEC validation for its resolution?
> 
> The general DNS use case would call for security of validated insecurity, but 
> other situations are possible too.
> * You do not want to trust TLSA / CERT / … records that have not been 
> validated
> * Kerberos5 tends to mistrust DNS, but inasfar as records are signed that 
> coudl be corrected
> * An application at a CA might have a policy to only trust signed portions of 
> DNS
> 
> So, if I am correct and there is no way to enforce DNSSEC validation on 
> everything returned, then could such an option be added in future versions?

Rick, 

Strictly speaking you are asking unbound do something that RFC4035 out-laws, 
i.e. see section 4.3,
Insecure is always returned.

I understand what you want and agree with you it would be nice to have this 
functionality. 
One way to do this is to run a local resolver behind a proxy that translates 
all answers w/o AD bit to an 
empty answer with RCODE>0, not sure what RCODE 

A better way might be to propose an EDNS0 option that expresses to the 
resolver: 
        only answer if AD==1 
and defines a new RCODE to express only insecure answer exists.

This way applications that want this functionality get it and all others that 
use the resolver
are not affected. 

        Olafur


_______________________________________________
Unbound-users mailing list
[email protected]
http://unbound.nlnetlabs.nl/mailman/listinfo/unbound-users

Reply via email to