mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 11:15:54 +03:00
[GH-ISSUE #2285] DNSSEC validation fails for NS nameservers.com. in test environment #953
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#953
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @japaric on GitHub (Jul 5, 2024).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/2285
Originally assigned to: @japaric on GitHub.
Describe the bug
what the title says
To Reproduce
cd conformance && DNS_TEST_VERBOSE_DOCKER_BUILD=1 DNS_TEST_SUBJECT="hickory $(dirname $(pwd))" cargo r --example explore -- --dnssecclient(see command-line output from step 1) container and rundig @$RESOLVER_IPV4_ADDR NS nameservers.com.(get the ipv4 address from the output of step 1)digoutput: AD flag is not sethickory-dnslogsExpected behavior
hickory-dnsshould be able to DNSSEC validate the query. Under the same conditions,unboundis able to do so: run theexploreexample withDNS_TEST_SUBJECT=unboundSystem:
Version:
Crate:
hickory-dnsVersion:
352e167bb1Additional context
Other queries like
SOA .andSOA nameservers.com.validate correctly. AD is set in the response of the resolver.@japaric commented on GitHub (Jul 5, 2024):
interesting that it reports that it cannot find the DS record because this query works and even has the AD bit set
and after that query gets cached, the original query gets DNSSEC validated (AD bit set):