BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] DNSSEC
- Subject: [Discuss] DNSSEC
- From: warlord at MIT.EDU (Derek Atkins)
- Date: Sun, 07 Dec 2014 15:00:18 -0500
- In-reply-to: <BN3PR0401MB1204C901B13FCEA99015C7F0DC670@BN3PR0401MB1204.namprd04.prod.outlook.com> (Edward Ned Harvey's message of "Sun, 7 Dec 2014 16:12:10 +0000")
- References: <BN3PR0401MB1204647CA6E7523747D3077FDC670@BN3PR0401MB1204.namprd04.prod.outlook.com> <BN3PR0401MB1204C901B13FCEA99015C7F0DC670@BN3PR0401MB1204.namprd04.prod.outlook.com>
"Edward Ned Harvey (blu)" <blu at nedharvey.com> writes: > In short, the question is: > > What is the behavior of an old dns caching server, when it receives a > client query for record types that it is too old to understand? Is it > able to dumbly relay that query upstream, and dumbly relay the > response back? > > The answer to this question essentially determines whether or not > DNSSEC is broken. The answer is "it depends on the caching server", however in my hasty tests it looks like servers even as old as 2009 (e.g. Bind 9.6.1) support DNSSEC pass through. E.g.: dig @old-server verisignlabs.com +dnssec gives me RRSIG results. This is as it should be. Obviously YMMV, but DNS is designed so that a caching server does not need to fully understand the contents of RRs in order to request, cache, or serve them. However there are some specific DNSSEC processing requirements, so very old DNSSEC-unaware caching servers may not properly send RRSIGs in the authority section properly. -derek -- Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory Member, MIT Student Information Processing Board (SIPB) URL: http://web.mit.edu/warlord/ PP-ASEL-IA N1NWH warlord at MIT.EDU PGP key available
- References:
- [Discuss] DNSSEC
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] DNSSEC
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] DNSSEC
- Prev by Date: [Discuss] free SSL certs from the EFF
- Next by Date: [Discuss] DNSSEC
- Previous by thread: [Discuss] DNSSEC
- Next by thread: [Discuss] DNSSEC
- Index(es):