Hello,

> I seem to remember seeing something about DNSSEC validation not working
> when a BIND server is used both to serve the DNSSEC signed zone
> authoritatively, and as a resolver? Unfortunately, I haven't managed to
> find this information again, and now I'm wondering if it was all in my
> head.

This may not be the reference you cannot find,
but at EURid, registry for the eu top level domain,
we have an "EU Insights" available that also addresses
- bogus and validating name servers (which is your case) (pg 15 + 16)
- validating forwarding name server (pg 17 + 18)

Cfr http://www.eurid.eu/files/Insights_DNSSEC2.pdf


Basically, a bogus, yet validating name server, is not a problem.
 The name server uses its local data first, answers do not have the "AD"
bit set.

It would be a problem if a validating NS forwards towards this bogus name
server,
 even regardless if the bogus name server is DNSSEC aware or not.


Kind regards,


Marc Lampo
Security Officer
 
    EURid
    Woluwelaan 150    
    1831 Diegem - Belgium
    marc.la...@eurid.eu
    http://www.eurid.eu

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to