[Bug 248239] local_unbound: Fails to resolve europris.no fail after 11.3->11.4 upgrade

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Mon Jul 27 17:19:58 UTC 2020


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248239

Chris Hutchinson <portmaster at bsdforge.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |portmaster at bsdforge.com

--- Comment #14 from Chris Hutchinson <portmaster at bsdforge.com> ---
Unless the version of unbound I'm running is newer
than the version in question. The answer I get is
is correct:

# head -n3 unbound.log | grep start
Jan 26 11:11:58 unbound[63414:0] info: start of service (unbound 1.7.3).

# drill -v
drill version 1.6.17 (ldns version 1.6.17)
Written by NLnet Labs.

Copyright (c) 2004-2008 NLnet Labs.
Licensed under the revised BSD license.
There is NO warranty; not even for MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE.

# drill -TD europris.no.
;; Number of trusted keys: 1
;; Domain: .
[T] . 172800 IN DNSKEY 256 3 8 ;{id = 46594 (zsk), size = 2048b}
. 172800 IN DNSKEY 257 3 8 ;{id = 20326 (ksk), size = 2048b}
Checking if signing key is trusted:
New key: .      172800  IN      DNSKEY  256 3 8 <LONG-HASH> ;{id = 46594 (zsk),
size = 2048b}
        Trusted key: .  172800  IN      DNSKEY  257 3 8 <LONG-HASH> ;{id =
20326 (ksk), size = 2048b}
        Trusted key: .  172800  IN      DNSKEY  256 3 8 <LONG-HASH> ;{id =
46594 (zsk), size = 2048b}
Key is now trusted!
        Trusted key: .  172800  IN      DNSKEY  257 3 8 <LONG-HASH> ;{id =
20326 (ksk), size = 2048b}
[T] no. 86400 IN DS 29471 8 2 <LONG-HASH> 
;; Domain: no.
[T] no. 3600 IN DNSKEY 257 3 8 ;{id = 29471 (ksk), size = 2048b}
no. 3600 IN DNSKEY 256 3 8 ;{id = 35961 (zsk), size = 1024b}
Checking if signing key is trusted:
New key: no.    3600    IN      DNSKEY  256 3 8 <LONG-HASH> ;{id = 35961 (zsk),
size = 1024b}
        Trusted key: .  172800  IN      DNSKEY  257 3 8 <LONG-HASH> ;{id =
20326 (ksk), size = 2048b}
        Trusted key: .  172800  IN      DNSKEY  256 3 8 <LONG-HASH> ;{id =
46594 (zsk), size = 2048b}
        Trusted key: .  172800  IN      DNSKEY  257 3 8 <LONG-HASH> ;{id =
20326 (ksk), size = 2048b}
        Trusted key: no.        3600    IN      DNSKEY  257 3 8 <LONG-HASH>
;{id = 29471 (ksk), size = 2048b}
        Trusted key: no.        3600    IN      DNSKEY  256 3 8 <LONG-HASH>
;{id = 35961 (zsk), size = 1024b}
Key is now trusted!
[T] europris.no. 7200 IN DS 25323 15 2 <LONG-HASH> 
europris.no. 7200 IN DS 25323 15 4 <LONG-HASH> 
;; Domain: europris.no.
;; Signature ok but no chain to a trusted key or ds record
[S] europris.no. 3600 IN DNSKEY 256 3 13 ;{id = 14997 (zsk), size = 256b}
europris.no. 3600 IN DNSKEY 257 3 15 ;{id = 25323 (ksk), size = 0b}
europris.no. 3600 IN DNSKEY 256 3 15 ;{id = 39946 (zsk), size = 0b}
europris.no. 3600 IN DNSKEY 257 3 13 ;{id = 46820 (ksk), size = 256b}
[S] europris.no.        3600    IN      A       194.63.248.52
;;[S] self sig OK; [B] bogus; [T] trusted

OTOH in any case the real solution (if required) would be from the (unbound)
developer(s).
With a WARN (from @secteam) as necessary to those affected, in the meantime.

--Chris

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are on the CC list for the bug.


More information about the freebsd-net mailing list