[rbldnsd] rblnsd +dnssec for pesudo tld zone
Lyle Giese
lyle at lcrcomputer.net
Wed Apr 6 16:43:07 MSD 2011
On 4/6/2011 6:04 AM, Lähteenmäki Mikko wrote:
>
> This is clipped from the post on
> https://lists.isc.org/pipermail/bind-users/2010-October/081577.html
>
> "When I recently installed the root dnssec initial key on our DNS it broke
>
> it's ability to accept responses for forwarded requests for a DNS block
> list zone served by another system. Other queries aren't affected. The
> config for the forwarded zone looks like:
>
> zone "dnsbl" {
> type forward;
> forward only;
> forwarders {
> 10.0.0.124;
> };
> };
>
> The server at 10.0.0.124 is running rbldnsd. Queries to our main resolver
> DNS for anything in the 'dnsbl' zone generate a SERVFAIL and BIND logs
> messages similar to the following:
>
> error (chase DS servers) resolving 'sbl.dnsbl/DS/IN': 10.0.0.124#53
>
> If I disable the root initial key, the forwarded queries work again. I
> think the problem is that our pseudo TLD 'dnsbl' isn't a signed zone or
> something like that. The RRs for the zone are retrieved from various spam
> BL repositories.
>
> Is there a way to disable dnssec validation on a per-zone basis for
> internal pseudo TLDs?
>
> Antonio Querubin
> 808-545-5282 x3003
> e-mail/xmpp:tony at lava.net <https://lists.isc.org/mailman/listinfo/bind-users>"
>
>
> We are facing the same problem on our test environment at the moment. Our server is running local BIND and rblnsd
>
> on localhost port XX. Anyone else having this issue?
>
>
> Br
>
>
> Mikko Lahteenmaki
>
> Finland
>
Why do you need to install the root dnssec initial key? I thought
normal DNS traffic downloaded those keys as necessary?
dlv.isc.org is different as it is not a root server, so to use
look-aside, you do need to have the keys for dlv.isc.org installed.
Lyle Giese
LCR Computer Services, Inc.
More information about the rbldnsd
mailing list