Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CNS DNSSEC Support #10

Open
teutat3s opened this issue Jul 31, 2018 · 1 comment
Open

CNS DNSSEC Support #10

teutat3s opened this issue Jul 31, 2018 · 1 comment

Comments

@teutat3s
Copy link
Member

teutat3s commented Jul 31, 2018

Steps to reproduce:

Setup CNS as hidden master
Setup DNS servers (BIND ISC) ns1.example.com (BIND master) & ns2.example.com (BIND slave) for example.com zone in combination with CNS as hidden master
Setup DNSSEC on ns1.example.com

Set a CNAME record to some instance like inst.dc.cns.example.com

dig CNAME example.com @8.8.8.8
will show ad flag (authentic domain) - DNSSEC 👍

dig A inst.dc.cns.example.com @8.8.8.8
will not show ad flag plus show a SERVFAIL - DNSSEC 👎

dig A inst.dc.cns.example.com @8.8.8.8 +cd
will show NOERROR proving DNSSEC validation problems.

This causes DNS troubles with tools like triton-dehydrated because Google's DNS 8.8.8.8 is very picky about DNSSEC flags. It just shows SERVFAIL.
Others like Cloudfare's 1.1.1.1 still show the ANSWER section but also produce SERVFAIL.

Are there any longterm plans on implementing DNSSEC into CNS? I guess this is a big task to be done... Would be looking forward to it a lot because now we have to disable DNSSEC on our side to be able to enjoy the CNAME magic of CNS.

@bahamat
Copy link
Member

bahamat commented Oct 31, 2018

Follow CNS-94 DNSSEC support for CNS for updates.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants