I am preparing to enable DNSSEC validation, so I am working on alerts for failed validations, so I can see whether they are user errors (that might need negative trust anchors or other exceptions) or actual attacks.
I stumbled on "mff.cuni.cz" which has RRSIG records that expired 3 months ago, but my validating server still gives an answer and says that it is valid. Is that expected? BIND 9.11.4-P2-RedHat-9.11.4-9.P2.el7 (Extended Support Version) <id:7107deb> [hostmast@ns-umd-nsbs-1 named]$ delv mff.cuni.cz @127.0.0.1 ;; validating mff.cuni.cz/DNSKEY: verify failed due to bad signature (keyid=47500): RRSIG has expired ; fully validated mff.cuni.cz. 28546 IN A 195.113.27.221 mff.cuni.cz. 28546 IN RRSIG A 13 3 28800 20200611045052 20200512043705 47500 mff.cuni.cz. ZbW+RXOvA24E+Fb0Z/M3OfMJdFD9vdRKD8nhylZSfB0fkq236lohWHGu 4A54HrqasAPkUHJd/LcoN1+k6bkAqw== [hostmast@ns-umd-nsbs-1 named]$ dig mff.cuni.cz @127.0.0.1 +adflag ; <<>> DiG 9.11.4-P2-RedHat-9.11.4-9.P2.el7 <<>> mff.cuni.cz @127.0.0.1 +adflag ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17300 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 1232 ;; QUESTION SECTION: ;mff.cuni.cz. IN A ;; ANSWER SECTION: mff.cuni.cz. 28784 IN A 195.113.27.221 ;; Query time: 0 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Thu May 14 09:51:53 EDT 2020 ;; MSG SIZE rcvd: 56 -- Bob Harold
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop