Hi there! First time poster. I'm a big fan of the work you're all doing.
I have trouble figuring out what is the real usage of the "Use DNSSEC" option in Settings. The way I see it, most of the Pi-hole workflows would most likely fall into one of these categories:
-
Forwarding requests to an upstream DNS server that supports DNSSEC. In this scenario, the DNSSEC validation will be done by the resolver the requests are forwarded to.
-
Forwarding requests to an upstream DNS server that supports DNSSEC while using a local DNS proxy to enable to use of DNSCrypt/DoT/DoH. The DNSSEC validation is still done by the upstream resolver.
-
Using a local resolver like Unbound. The DNSSEC validation would then be done by the local resolver (Unbound).
In these cases, the DNSSEC validation is always done outside of the Pi-hole.
I thought this option could be useful for validating DNSSEC in the event of someone using an upstream DNS resolver not supporting DNSSEC, but the comment under the option in Settings explicitly warns against doing this:
"If a domain fails validation or the upstream does not support DNSSEC, this setting can cause issues resolving domains. Use Google, Cloudflare, DNS.WATCH, Quad9, or another DNS server which supports DNSSEC when activating DNSSEC".
Nevertheless, enabling the option does give a really neat level of insight about the DNSSEC support of domains with the Secure/Insecure/Bogus status. But in my experience with my workflow (Pi-hole --> DNS proxy [Cloudflared or DNSCrypt-Proxy enabling DoH] --> Quad9), the Pi-hole validation also introduces some false positives, marking a certain number of requests "Bogus" when they shouldn't be. Not a lot, but enough to be regularly disruptive.
So in what cases can the "Use DNSSEC" option be really useful?
Oh, and I wanted to take the opportunity to congratulate everybody involved in the 5.0 release. This release rocks! I love it so much!