Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNSSEC (Hardened) not supported by many ISPs' DNS servers - check + hint + config should be offered in wizzard #1962

Closed
hutiucip opened this issue Nov 27, 2017 · 6 comments
Assignees
Labels
feature Adding new functionality
Milestone

Comments

@hutiucip
Copy link

Hello!

As enough DNS servers/ resolvers don't cope well with DNSSEC, especially if hardened, would it be possible that, after fresh install, the wizzard to check DNS resolution and, if DNS resolution fails, to offer a hint regarding disabling DNSSEC hardened data (most issues), and eventually even disabling DNSSEC completely? Of course, only with informing users that this will lower the security of their OPNsense installation, and that they should properly configure their DNS servers, or to address a request to the DNS provider to enable and properly configure DNSSEC on servers.

Several first time users already had (and future first time users will have) a bad first experience when DNSSEC is not supported by their DNS servers/ resolvers, AND the first impression is (falsely) that OPNsense is at fault.

Thank you!

@fichtner fichtner self-assigned this Nov 27, 2017
@fichtner fichtner added the feature Adding new functionality label Nov 27, 2017
@fichtner fichtner added this to the 18.1 milestone Nov 27, 2017
@fichtner
Copy link
Member

Hi @hutiucip, thanks, will take care of this. :)

@fichtner
Copy link
Member

@hutiucip upon further reflection, we will disable dnssec-stripped option in the default install and go from there. unbound enables this by default but not dnssec, it's a slippery slope and hopefully a sane tradeoff

CC @fabianfrz

@fabianfrz
Copy link
Member

@fichtner DNSSEC works best in resolver mode as this is the only way to get a chain of trust.

A DNS server working as a forwarder will only see the AD flag, which could be set by anyone (as the data is not signed).

@fichtner
Copy link
Member

@fabianfrz we are in resolver mode, debating dnssec-stripped usage

@fichtner
Copy link
Member

I'm reopening this briefly. The system wizard usability was improved. We should add three unbound checkboxes: resolver mode, enable dnssec, dnssec hardening, where only resolver mode is the one that is active by default. That would also mean stripping dnssec from the default. I fear hardening is not enough to take away to really fix it. Feedback welcome.

@fichtner
Copy link
Member

Works as previously stated. :)

fichtner added a commit that referenced this issue Dec 21, 2017
(cherry picked from commit 0455980)
(cherry picked from commit a48167c)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Adding new functionality
Development

No branches or pull requests

3 participants