Using a newly installed Pi-hole with my raspberry pi 2b+, I wanted to add unbound which I installed with use of this (official) install manual: Redirecting...
DDNSSec is switched off in Pi Hole.
DNSSec validation works properly if you use the manual's 'test':
dig sigfail.verteiltesysteme.net @127.0.0.1 -p 5353 # returns SERVFAIL
dig sigok.verteiltesysteme.net @127.0.0.1 -p 5353 # returns NOERROR
However. Using other sites to verify that DNSSec is working (like: https://www.cyberciti.biz/faq/unix-linux-test-and-validate-dnssec-using-dig-command-line/), it fails to add an AD flag to the result.
https://dnssec-analyzer.verisignlabs.com alsof fails:
No DS records found for google.com in the com zone
No DNSKEY records found
www.google.com A RR has value 172.217.20.68
No RRSIGs found
https://dnssec.vs.uni-due.de/ shows:
"No, your DNS resolver does NOT validate DNSSEC signatures."
Lastly, https://internet.nl/ states:
## Signed domain name (DNSSEC)
Too bad! Your domain is *not* signed with a valid signature ([DNSSEC](https://internet.nl/faqs/dnssec/)).
Is this a problem? How to solve it?
This is myUnbound config file:
server:
# If no logfile is specified, syslog is used
# logfile: "/var/log/unbound/unbound.log"
# Level 2 gives detailed operational information
verbosity: 2
port: 5353
do-ip4: yes
do-udp: yes
do-tcp: yes
# May be set to yes if you have IPv6 connectivity
do-ip6: no
# Use this only when you downloaded the list of primary root servers!
# root-hints: "/var/lib/unbound/root.hints"
# Respond to DNS requests on all interfaces
interface: 0.0.0.0
# Maximum UDP response size, default is 4096
max-udp-size: 3072
# IPs authorized to access the DNS Server
access-control: 0.0.0.0/0 refuse
access-control: 127.0.0.1 allow
access-control: 192.168.1.0/24 allow
# If you have a guest network with a separate DHCP range
#access-control: 172.16.1.0/24 allow
#access-control: 10.0.0.0/24 allow
# Hide DNS Server info
hide-identity: yes
hide-version: yes
# Trust glue only if it is within the servers authority
harden-glue: yes
# Require DNSSEC data for trust-anchored zones, if such data is absent, the zone becomes BOGUS
harden-dnssec-stripped: yes
# Burdens the authority servers, not RFC standard, and could lead to performance problems
harden-referral-path: no
# Add an unwanted reply threshold to clean the cache and avoid, when possible, DNS poisoning
unwanted-reply-threshold: 10000000
# Don't use Capitalization randomization as it known to cause DNSSEC issues sometimes
# see https://discourse.pi-hole.net/t/unbound-stubby-or-dnscrypt-proxy/9378 for further details
use-caps-for-id: no
# Reduce EDNS reassembly buffer size.
# Suggested by the unbound man page to reduce fragmentation reassembly problems
edns-buffer-size: 1472
# Perform prefetching of close to expired message cache entries
# This only applies to domains that have been frequently queried
prefetch: yes
# Fetch the DNSKEYs earlier in the validation process, which lowers the latency of requests
# but also uses a little more CPU
prefetch-key: yes
# Time To Live (in seconds) for DNS cache. Set cache-min-ttl to 0 remove caching (default).
# Max cache default is 86400 (1 day).
cache-min-ttl: 3600
cache-max-ttl: 86400
# If enabled, attempt to serve old responses from cache without waiting for the actual
# resolution to finish.
# serve-expired: yes
# serve-expired-ttl: 3600
# Use about 2x more for rrset cache, total memory use is about 2-2.5x
# total cache size. Current setting is way overkill for a small network.
# Judging from my used cache size you can get away with 8/16 and still
# have lots of room, but I've got the ram and I'm not using it on anything else.
# Default is 4m/4m
msg-cache-size: 128m
rrset-cache-size: 256m
# One thread should be sufficient, can be increased on beefy machines.
# In reality for most users running on small networks or on a single machine it should
# be unnecessary to seek performance enhancement by increasing num-threads above 1.
num-threads: 1
# Ensure kernel buffer is large enough to not lose messages in traffic spikes
so-rcvbuf: 1m
# Ensure privacy of local IP ranges
private-address: 192.168.1.0/16
private-address: 169.254.0.0/16
private-address: 172.16.0.0/12
private-address: 10.0.0.0/8
private-address: fd00::/8
private-address: fe80::/10
# Create DNS record for Pi-Hole Web Interface
private-domain: "pi.hole"
local-zone: "pi.hole" static
local-data: "pi.hole IN A 192.168.1.4"