Skip to content
Snippets Groups Projects
Commit afdb38a3 authored by Ronan Pigott's avatar Ronan Pigott Committed by Lennart Poettering
Browse files

resolved: validate noerror response for CNAMEs

CNAME doesn't exist at the zone apex. When we get an unsigned noerror
response to a direct query for a CNAME record, we don't yet know if this
name is zone apex. We already request the correct DS record in this
case, but previously skipped it at validation time, causing the answer
to appear bogus. Make sure to also consider the DS record for the query
name for negative replies.
parent a95aacc8
Branches
No related tags found
No related merge requests found
......@@ -3071,16 +3071,6 @@ static int dns_transaction_requires_nsec(DnsTransaction *t) {
name = dns_resource_key_name(dns_transaction_key(t));
if (IN_SET(dns_transaction_key(t)->type, DNS_TYPE_DS, DNS_TYPE_CNAME, DNS_TYPE_DNAME)) {
/* We got a negative reply for this DS/CNAME/DNAME lookup? Check the parent in this case to
* see if this answer should have been signed. */
r = dns_name_parent(&name);
if (r < 0)
return r;
if (r == 0)
return true;
}
/* For all other RRs we check the DS on the same level to see
* if it's signed. */
......
......@@ -496,6 +496,8 @@ testcase_08_resolved() {
grep -qF "15 mail.unsigned.test." "$RUN_OUT"
run resolvectl query --legend=no -t MX unsigned.test
grep -qF "unsigned.test IN MX 15 mail.unsigned.test" "$RUN_OUT"
run dig @ns1.unsigned.test +noall +comments unsigned.test CNAME
grep -qF "status: NOERROR" "$RUN_OUT"
: "--- ZONE: signed.test (static DNSSEC) ---"
# Check the trust chain (with and without systemd-resolved in between
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment