-
-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use EDE data when "proxy-dnssec" is used #1551
Conversation
…upstream Signed-off-by: DL6ER <dl6er@dl6er.de>
Signed-off-by: DL6ER <dl6er@dl6er.de>
…masq option is used Signed-off-by: DL6ER <dl6er@dl6er.de>
Signed-off-by: DL6ER <dl6er@dl6er.de>
This pull request has been mentioned on Pi-hole Userspace. There might be relevant details there: |
ftl crash, using this branch, see https://discourse.pi-hole.net/t/dnssec-discussion-support-for-proxy-dnssec/62217/12 for details, FTL.log with debug flags enabled attached in the topic. edit |
Signed-off-by: DL6ER <dl6er@dl6er.de>
Signed-off-by: DL6ER <dl6er@dl6er.de>
Signed-off-by: DL6ER <dl6er@dl6er.de>
Signed-off-by: DL6ER <dl6er@dl6er.de>
build failure? |
…eam (if they are not already validated as SECURE) or from cache. This is a direct consequence from the previous commit. Signed-off-by: DL6ER <dl6er@dl6er.de>
Signed-off-by: DL6ER <dl6er@dl6er.de>
PR ready for review + merge. PR text edited to reflect the lastest state |
don't know if this can be / needs correcting. NOT a big deal, but if it can be changed easily... |
@jpgpi250 This is expected and agreement with queries in "normal" DNSSEC mode. Queries are either |
This pull request has been mentioned on Pi-hole Userspace. There might be relevant details there: https://discourse.pi-hole.net/t/dnssec-discussion-support-for-proxy-dnssec/62217/48 |
By submitting this pull request, I confirm the following:
How familiar are you with the codebase?:
10
When the
dnsmasq
optionproxy-dnssec
is used, FTL uses the AD bit to determine the
INSECURE
/SECURE
status of queries. In cases where the upstream resolver includes EDE data for errors (e.g.unbound 1.16.0+
), FTL also analyses this data to tell apartSERVFAIL
s caused by a "real" server failure from craftedSERVFAIL
s due to failed DNSSEC validation.See linked Discourse Discussion for further details and extensive testing done by @jpgpi250
To get
proxy-dnssec
working, you'll need to addto
unbound
sserver
section andto a custom
dnsmasq
config file. Theadd-cpe-id
options is necessary to query EDE data from the upstream destination in case a client does not signal EDNS0 support.All in all, this PR also improves the internal handling of DNSSEC status and, e.g., ensures ignored queries (because they are duplicated) are not stamped
INSECURE
when this is not actually true (they are actually "nothing" as they are ignored). This makes this PR an enhancement even for the vast majority that will never useproxy-dnssec
.