mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 11:15:54 +03:00
[GH-ISSUE #2193] hickory-dns resolver does not honor the DO bit in client's queries #916
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#916
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @japaric on GitHub (Apr 24, 2024).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/2193
Describe the bug
What the title says. This causes
+dnssecqueries likedig +dnssec +noadflag SOA .to NOT return any DNSSEC record (NOTE:+noadflagtells the server that DNSSEC validation is not desired)Furthermore hickory-dns does not set the DO in the queries that it sends out on behalf of a client thus not fulfilling the requirement in section 3.2.1 of RFC4035 (emphasis mine)
Other DNS resolvers like BIND's
namedandunboundfulfill this requirement regardless of whether DNSSEC validation is enabled / enforced or not.To Reproduce
Steps to reproduce the behavior:
Build
hickory-dnswith the following Cargo features:dnssec-openssl,recursorRun
hickory-dnswith this configurationnamed.toml/tmp/root.hintsdig -p $PORT @127.0.0.1 +dnssec +noadflag SOA .Expected behavior
The answer should have included DNSSEC records like RRSIG records. For example,
unboundresponds withunbound.conf
System:
rust:1-slim-bookworm(Docker image)Version:
Crate:
hickory-dnsVersion:
6334a014Additional context
A test of the RFC requirement, that does not require internet access, can be found in the dnssec-tests repo
@bluejekyll commented on GitHub (May 18, 2024):
was this fixed in #2196?
@japaric commented on GitHub (May 22, 2024):
yes, this was fixed in #2196