On Wed, Aug 18, 2010 at 9:48 AM, Dave Sparro <dspa...@gmail.com> wrote:
> On 8/18/2010 8:30 AM, Phil Mayers wrote:
>>
>> ...since the "ncbi" zone is an unsigned child zone, there needs to be an
>> NSEC/NSEC3 record to prove the absence of the DS record, and have a
>> secure delegation to an unsigned child zone.
>
>
> It sounds to me like DNSSEC validation is working as designed.  If your DNS
> server's users are complaining about not being able to resolve something
> that fails validation, the question you need to ask is do your end-users
> really want you to do DNSSEC validation for them?
>
> If you're asking for a workaround for when validation fails, there's not
> much point to doing the validation.
>

Insecure delegations are not a work-around, but are rather a provision
for delegated child zones that have not implemented DNSSEC.  The
parent zone (and its authoritative servers) must be properly
configured to handle authenticated denial of existence using NSEC or
NSEC3.  Specifically, they must use these RRs to prove the
non-existence of a DS RR for an unsigned child zone, whose existence
would otherwise indicate a secure delegation.  If the proper
NSEC/NSEC3 RRs are not returned, or are not thought to be authentic,
then there is a broken chain because the resolver cannot prove that
the delegation is insecure.  In the following diagram, note the
diamond-shaped NSEC3 node, whose presence (when properly
authenticated) proves the insecure delegation to ncbi.nlm.nih.gov:
http://dnsviz.net/d/www.ncbi.nlm.nih.gov/dnssec/

Regards,
Casey
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to