Have you verified that your local DNS resolver (chain) actually verifies DNSSEC? My dig
doesn't seem to validate DNSSEC [in default mode], even with +dnssec
on (it just seems to set the DO flag which causes the response to have DNSSEC-records such as RRSIGs).
I've been using the test system by https://verteiltesysteme.net/ for years. They've always been failing
reliable for me. Contrary to dnssec-failed.org
(which seems to have intentionally placed no keys on the zone while publishing a DS) the test by verteiltesysteme actually produces intentionally broken RRSIGs.
This is a broken response:
# dig sigfail.verteiltesysteme.net @ns1.verteiltesysteme.net +dnssec
; <<>> DiG 9.16.27-Debian <<>> sigfail.verteiltesysteme.net @ns1.verteiltesysteme.net +dnssec +crypto
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6192
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: f92b46e94822532e010000006283b92c714b51ba7a2fc0ce (good)
;; QUESTION SECTION:
;sigfail.verteiltesysteme.net. IN A
;; ANSWER SECTION:
sigfail.verteiltesysteme.net. 60 IN A 134.91.78.139
sigfail.verteiltesysteme.net. 60 IN RRSIG A 5 3 60 20220730020002 20220430020002 30665 verteiltesysteme.net. //This+RRSIG+is+deliberately+broken///For+more+informati on+please+go+to/http+//www+verteiltesysteme+net///////// //////////////////////////////////////////////////////// //8=
;; Query time: 12 msec
;; SERVER: 2001:638:501:8efc::139#53(2001:638:501:8efc::139)
;; WHEN: Tue May 17 17:03:08 CEST 2022
;; MSG SIZE rcvd: 281
Note that dig doesn't seem to transform the authoritative reply from the NS to a SERVFAIL (as stated above), but when I query a DNSSEC-validating resolver (Cloudflare's 1.1.1.1 also has EDE support):
# dig sigfail.verteiltesysteme.net @1.1.1.1 +dnssec
; <<>> DiG 9.16.27-Debian <<>> sigfail.verteiltesysteme.net @1.1.1.1 +dnssec
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 31057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; EDE: 6 (DNSSEC Bogus): (failed to verify sigfail.verteiltesysteme.net. A: using DNSKEY ids = [30665])
;; QUESTION SECTION:
;sigfail.verteiltesysteme.net. IN A
;; Query time: 12 msec
;; SERVER: 1.1.1.1#53(1.1.1.1)
;; WHEN: Tue May 17 17:09:03 CEST 2022
;; MSG SIZE rcvd: 139
They also offer a positive test, sigok.verteiltesysteme.net
# dig sigok.verteiltesysteme.net @1.1.1.1 +dnssec
; <<>> DiG 9.16.27-Debian <<>> sigok.verteiltesysteme.net @1.1.1.1 +dnssec
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22293
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
;; QUESTION SECTION:
;sigok.verteiltesysteme.net. IN A
;; ANSWER SECTION:
sigok.verteiltesysteme.net. 60 IN A 134.91.78.139
sigok.verteiltesysteme.net. 60 IN RRSIG A 5 3 60 20220730020002 20220430020002 30665 verteiltesysteme.net. Ob8AFd19nUT689fsrds2nC7D+iFK8AfaEquH//9iuZ69Z4zdIzUeglVI PY0ZJMsj0uZM+AddNQ5leaQuWXUcU3lJ9aGLTxyNjLHQTxkPT9tdbRtL qqSIOQcKSlW2mBSpghWnuvKnejL253uFirvB2VWzzVtXoXI+TZxnoELQ TBc=
;; Query time: 184 msec
;; SERVER: 1.1.1.1#53(1.1.1.1)
;; WHEN: Tue May 17 17:10:05 CEST 2022
;; MSG SIZE rcvd: 251