-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNSSEC seems broken when using custom forwarding #51
Comments
hm... so hnsd's recursive resolver (from libunbound) is forwarding |
The fact is I want to keep Pihole as first DNS in the chain for blocking and statistics purposes. If I do the following |
What are you trying to accomplish by forwarding the |
In fact I want to dedicate HSND to Handshake domains only. Ideally I want HSND behind Pihole because Pihole give statistics per client, putting HSND in front of Pihole cause the lose of this feature, and also cause the lose of being able to block Handshake domains. |
Ok cool so this is the same issue as #53 and I tried fixing with #62 but its a doozy, I'll have to come back to this. The goal of having an alternate resolver when a name is not found in HNS is harder than it sounds. Handshake tries to act like there's really only one root zone, so splitting it into two roots is not clean. |
Hi,
My setup is the following:
unbound <-> hnsd <-> pi-hole <- queries
Sample of
unbound.conf
used in HNSD:Using "cloudflare.com" as example.
When Pi-hole validate the DNSSEC answer it tries to resolve
cloudflare.com
thencom
then.
Everything is going fine until Pi-hole reaches
.
Here is dig answer from Pi-hole querying HNSD:
Here is the dig answer from Pi-hole when querying unbound;
Hope that'll help.
The text was updated successfully, but these errors were encountered: