Daisuke HIGASHI via Unbound-users skrev den 2017-04-05 15:23:

For your information you can configure BIND9 to accept
secure (DNSSEC validated) response only:

 options {
    dnssec-must-be-secure . yes;
 };
 managed-keys { .... };

With this configuration you can resolve signed (secure) domain only:

 $ dig @::1 unbound.net +short
 185.49.140.10

 $ dig @::1 isc.org +short
 149.20.64.69

works as designed then, it protect you from using these ips blindly

But you won't be able to reach all unsigned (insecure) domain, as
Wouter pointed out:

when domains is not dnssec, you cant enforce dnssec without any risk of not see results as expected

 $ dig @::1 yahoo.com
 ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 46417

https://dane.sys4.de/smtp/yahoo.com

 $ dig @::1 google.com
 ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 63482

https://dane.sys4.de/smtp/google.com

 $ dig @::1 twitter.com
 ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 7986

https://dane.sys4.de/smtp/twitter.com


i know dane is not meant to be used here, it just good source to confirm that its not your unbound not working :=)

funny enough yahoo google twitter are all using dkim signed mails, whats there point with it :/

Reply via email to