On 17/10/2017 7:14 PM, Viktor Dukhovni wrote:

> So it seems that the machine in question has the authoritative
> server for the zone as its recursive server.  Such mixing of
> authoritative and recursive workloads is discouraged these days,
> and critically, it breaks DANE in Postfix for any authoritative
> zones, because authoritative servers are not validating resolvers,
> and don't set the AD bit in authoritative replies.

Bingo.  That information certainly explains the behavior observed.

Does this therefore require DNSSEC-validation to be set to "no" (for the
authoritative NS):
   dnssec-enable yes;
   dnssec-validation no;
   dnssec-lookaside auto;


> The A record is not seen as "secure" by Postfix.

Got it.

> On my server the authoritative BIND nameserver listens on the 
> external public IP address, while the validating unbound resolver
> listens on 127.0.0.1 and the internal network interface.  The
> "/etc/resolv.conf" file lists 127.0.0.1, so DNS queries from
> applications go to unbound, not BIND.  The "unbound" server
> is configured to do DNSSEC validation, and queries BIND setting
> the "ad" bit as/when appropriate.
> 
> The BIND server refuses recursion, while the unbound server
> serves no authoritative zones.


Mal


Reply via email to