Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"A record from a delegated zone" policy check #24

Open
tobez opened this issue Aug 15, 2012 · 2 comments
Open

"A record from a delegated zone" policy check #24

tobez opened this issue Aug 15, 2012 · 2 comments

Comments

@tobez
Copy link
Owner

tobez commented Aug 15, 2012

Via Daniel Stirnimann:

$TTL    1d
$INCLUDE Kexample.com.+008+18169.key
$INCLUDE Kexample.com.+008+57699.key
@       IN      SOA     ns.example.com. hostmaster.example.com. (
                              1         ; Serial
                         604800         ; Refresh
                          86400         ; Retry
                        2419200         ; Expire
                         604800 )       ; Negative Cache TTL

                IN      NS      ns1.example.net.
sub             IN      NS      ns1.example.net.
test.sub        IN      A       127.0.0.1

The error is that there exists the "test.sub" record but "sub" is
already delegated.

BIND "dnssec-signzone" ignores "test.sub" and does not create
RRSIG/NSEC/NSEC3 records.

When I verify the signed zone (using NSEC) with validns, no error is shown.

When I verify the signed zone (using NSEC3) with validns, the error:
"no corresponding NSEC3 found for test.sub.example.com." is shown which
is correct.

I'm not sure what's the right way of handling this error is. In any
case, I think the error message should be the same whether NSEC or NSEC3
is used. Practically, I could live with a WARNING and not an ERROR
because, as far as BIND dnssec-signzone goes, the additional record of
the delegated zone is not signed, so does not lead to a signing error.
However, I'm not sure if other DNSSEC signing tools handle this the same
way.

@tobez
Copy link
Owner Author

tobez commented Aug 15, 2012

Validns is wrong producing an error for NSEC3.

An acceptable way of reporting this would be to report an "Unused glue
record" or a "Record from a delegated zone", optionally, activated via yet
another policy check. Do you concur?

The only thing I need to check is what dnssec-signzone does for/what RFCs
say about real glue records such as

sub     IN NS ns1.sub
ns1.sub IN A  1.2.3.4

@tobez
Copy link
Owner Author

tobez commented Aug 24, 2012

Mostly solved by commit fddc43c.

Still need to add the policy check.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant