On Sun, Aug 31, 2014 at 11:35:40AM +0200, Patrick Ben Koetter wrote: > p@x240:~$ dig SOA +dnssec sys4.de > > ; <<>> DiG 9.9.5-3-Ubuntu <<>> SOA +dnssec sys4.de > ;; global options: +cmd > ;; Got answer: > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61650 > ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 3 > > ^^ > > If you don't see it, you resolver cannot authenticated DNSSEC enabled domains. > Then you need to change that.
I see this: # dig SOA +dnssec sys4.de ; <<>> DiG 9.9.5-3-Ubuntu <<>> SOA +dnssec sys4.de ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22031 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 1 As resolver I have Bind: # cat /etc/resolv.conf nameserver 10.0.3.1 And on 10.0.3.1 I have this: forwarders { 213.133.98.98; 213.133.99.99; 213.133.100.100; }; //======================================================================== // If BIND logs error messages about the root key being expired, // you will need to update your keys. See https://www.isc.org/bind-keys //======================================================================== dnssec-enable yes; dnssec-validation auto; dnssec-lookaside auto; Is it possible that forwarders has more priority than the DNSSEC options of bind? -- Best regards, Peter Bauer Linux & UNIX developper