mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-24 18:55:55 +03:00
[GH-ISSUE #3441] Provide iterator showing DNSSEC status directly on SrvLookup result. #1183
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#1183
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @davidv1992 on GitHub (Jan 21, 2026).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/3441
Is your feature request related to a problem? Please describe.
Currently, to check that SRV records are signed with dnssec, the srv lookup result needs to be downgraded to a general lookup result, only after which the
dnssec_iter()function is available. Then the items in that iterator need to be manually back-converted to references toSRVobjects for use. The entire thing is a bit of a convoluted process.Describe the solution you'd like
It would be very nice to have a direct
dnssec_iter()on theSrvLookuptype that provides access to dnssec validation results on theSRVrecord objects directly.Describe alternatives you've considered
None
Additional context
SRV records can change the name which should be expected for TLS certificates. Because of this, validating that they were indeed DNSSEC signed can be critical for an applications security. This in particular is a problem for SRV style pools of NTS servers.
Note: this is for the hickory-resolver crate.
@cpu commented on GitHub (Feb 12, 2026):
That sounds pretty reasonable to me. Do you think you have cycles to contribute a patch? I'd be happy to review but would be unlikely to be able to prioritize implementing it myself relative to other commitments.