How can I tell whether DNSSEC is working?

The simplest solution is to try to resolver one of the domains that are deliberately DNSSEC-broken for testing. An example (192.168.2.254 is my Turris Omnia:

% dig @192.168.2.254 A servfail.nl

; <<>> DiG 9.9.5-9+deb8u8-Debian <<>> @192.168.2.254 A servfail.nl
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 35638
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;servfail.nl.		IN A

;; Query time: 148 msec
;; SERVER: 192.168.2.254#53(192.168.2.254)
;; WHEN: Wed Dec 21 15:54:08 CET 2016
;; MSG SIZE  rcvd: 40

SERVFAIL is normal, the domain has been broken on purpose.

Ideally, you could run dig with the +cd option (Checking Disabled) and therefore see the data. Unfortunately, a bug in the Knot resolver prevents it :frowning: https://gitlab.labs.nic.cz/knot/resolver/issues/97

Also, when testing signed domains, you should see a AD (Authentic Data) flag. Another bug of the resolver prevents this simple test :frowning:

1 Like