Skip to content
jmw's profile

Visitor

 • 

1 Message

Sunday, August 30th, 2015 12:00 PM

DNSSEC using Comcast DNS servers

I have a caching BIND server running on the LAN, and it logs hundreds of errors like this per day:

 

Aug 30 12:05:47 nuc named[850]:   validating @0x7fc6d4018b50: com SOA: got insecure response; parent indicates it should be secure
Aug 30 12:05:47 nuc named[850]: error (no valid RRSIG) resolving 'facebook.com/DS/IN': 75.75.75.75#53
Aug 30 12:05:47 nuc named[850]:   validating @0x7fc6cc4fe120: com SOA: got insecure response; parent indicates it should be secure
Aug 30 12:05:47 nuc named[850]: error (no valid RRSIG) resolving 'amazonaws.com/DS/IN': 75.75.75.75#53
Aug 30 12:06:23 nuc named[850]:   validating @0x7fc6dc8a03e0: com SOA: got insecure response; parent indicates it should be secure
Aug 30 12:06:23 nuc named[850]: error (no valid RRSIG) resolving 'mozilla.com/DS/IN': 75.75.75.75#53

This doesn't actually prevent clients from resolving names, but it logs a ton of errors. This is the BIND setup in named.conf:

 

    forwarders {
            # Comcast
            2001:558:feed::1;
            2001:558:feed::2;
            75.75.75.75;
            75.75.76.76;
    };
    forward only;

    dnssec-enable yes;
    dnssec-validation auto;
    dnssec-lookaside auto;

Are the Comcast servers stripping out DNSSEC signatures (I asked this on serverfault and that's what the responses were)? If that's the case, why do this? Is there a way to use Comcast DNS servers and do DNSSEC validation locally?

No Responses!