Expected Behaviour:
Pass DNSSEC tests @ dnssec.vs.uni-due.de and www.dnssec-tools.org and fail to load www.dnssec-failed.org with Google DNS or with dnscrypt & opennic sources
Actual Behaviour:
Everything was working fine when I was running pihole on centos 7 on my pi2. Had some unrelated issues plus non stop kernel panics on centos 7 so decided to switch to raspbian. I haven't been able to get the DNSSEC to work since switching to raspbian even with a clean install.
DNSSEC website tests fail @ dnssec.vs.uni-due.de but works @ www.dnssec-tools.org. www.dnssec-failed.org also loads when it shouldn't be.
Tailing the logs, it looks like it is working which I assume would be the most accurate, but I'm unsure. Also appears to be fine when I dig the domains as well.
May 15 22:11:05 dnsmasq[6158]: 1258 192.168.1.123/58243 validation 7cf7-sigfail.verteiltesysteme.net is BOGUS
May 15 22:11:12 dnsmasq[6158]: 1261 192.168.1.123/61156 query[A] sigfail.verteiltesysteme.net from 192.168.1.123
May 15 22:11:12 dnsmasq[6158]: 1261 192.168.1.123/61156 forwarded sigfail.verteiltesysteme.net to 8.8.8.8
May 15 22:11:12 dnsmasq[6158]: 1261 192.168.1.123/61156 validation sigfail.verteiltesysteme.net is BOGUS
May 15 22:12:18 dnsmasq[6158]: 1262 192.168.1.123/61159 query[A] sigfail.verteiltesysteme.net from 192.168.1.123
May 15 22:12:18 dnsmasq[6158]: 1262 192.168.1.123/61159 forwarded sigfail.verteiltesysteme.net to 127.0.0.1
May 15 22:12:18 dnsmasq[6158]: 1262 192.168.1.123/61159 forwarded sigfail.verteiltesysteme.net to 8.8.4.4
May 15 22:12:18 dnsmasq[6158]: 1262 192.168.1.123/61159 forwarded sigfail.verteiltesysteme.net to 8.8.8.8
May 15 22:12:19 dnsmasq[6158]: 1262 192.168.1.123/61159 validation sigfail.verteiltesysteme.net is BOGUS
May 15 22:12:50 dnsmasq[6158]: 1265 192.168.1.123/52177 query[A] www.dnssec-tools.org from 192.168.1.123
May 15 22:12:50 dnsmasq[6158]: 1265 192.168.1.123/52177 forwarded www.dnssec-tools.org to 127.0.0.1
May 15 22:12:50 dnsmasq[6158]: 1265 192.168.1.123/52177 forwarded www.dnssec-tools.org to 8.8.4.4
May 15 22:12:50 dnsmasq[6158]: 1265 192.168.1.123/52177 forwarded www.dnssec-tools.org to 8.8.8.8
May 15 22:12:51 dnsmasq[6158]: * 192.168.1.123/52177 dnssec-query[DNSKEY] dnssec-tools.org to 8.8.4.4
May 15 22:12:51 dnsmasq[6158]: * 192.168.1.123/52177 reply dnssec-tools.org is DNSKEY keytag 34816, algo 5
May 15 22:12:51 dnsmasq[6158]: * 192.168.1.123/52177 reply dnssec-tools.org is DNSKEY keytag 19221, algo 5
May 15 22:12:51 dnsmasq[6158]: * 192.168.1.123/52177 reply dnssec-tools.org is DNSKEY keytag 3147, algo 5
May 15 22:12:51 dnsmasq[6158]: 1265 192.168.1.123/52177 validation result is SECURE
dig sigfail.verteiltesysteme.net
; <<>> DiG 9.10.3-P4-Raspbian <<>> sigfail.verteiltesysteme.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;sigfail.verteiltesysteme.net. IN A
;; Query time: 236 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Tue May 15 22:23:10 EDT 2018
;; MSG SIZE rcvd: 57
dig sigok.verteiltesysteme.net
; <<>> DiG 9.10.3-P4-Raspbian <<>> sigok.verteiltesysteme.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5319
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;sigok.verteiltesysteme.net. IN A
;; ANSWER SECTION:
sigok.verteiltesysteme.net. 30 IN A 134.91.78.139
;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Tue May 15 22:23:22 EDT 2018
;; MSG SIZE rcvd: 71
Debug Token:
ypll6difrp