-
Notifications
You must be signed in to change notification settings - Fork 126
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFE: Retry fetching of trust anchor for DNSSEC validation #408
Comments
Acknowledged. Failure of fetching the trust anchor results in This will prevent fetching, because One way around this might be to register the time when |
I'm sure this thinking is faulty, but I'll ask anyway: If I've configured stubby to require dnssec validation, wouldn't I expect to get SERVFAIL until the trust anchor is in place? IOW, to me, it seems surprising to ever get non-validated responses from stubby if I've configured stubby to validate. What am I missing? |
The DNSSEC configuration is quite subtle and I can see why this leads to confusion fo users. None of the current settings do what you want (hard fail if I DNSSEC is configured but stubby can't fetch the trust anchor - I've talked to @wtoorop and agreed we need a new option for this and much better logging of the failure mode). Have a read of this section of the API: Stubby only SERVFAILS if the answer is BOGUS, without a trust anchor I believe everything comes back INDETERMINATE.... |
When this extension is set, GETDNS_DNSSEC_INDETERMINATE status will no longer be returned.
It's in 1.5.0 |
As far as I can see, the backoff time isn't exposed via the Stubby configuration, is it? |
It should be, because stubby uses the |
Just tested it and it works. I updated the example configuration file with an example: getdnsapi/stubby@006e43fd . |
Great, thanks. I guess the same thing applies to the new TLS options as well? |
Yes, I'll add those to the example config file as well (as you requested in getdnsapi/stubby#148 ) |
Currently stubby tries to retrieve a trust anchor on startup. If that fails, stubby gives up on DNSSEC validation. This can be problematic if stubby is started before the wan connection is fully up. In OpenWRT we work around this by using triggers. But it would b better if stubby would try to retrieve the trust anchor ahead of subsequent lookups, otherwise stubby will be silently not validating, and the user could be misled as to the validity of the returned records.
This was discussed here, and @saradickinson recommended raising an issue here for the attention of @wtoorop .
The text was updated successfully, but these errors were encountered: