mirror of
https://gitea.blesmrt.net/mikaela/shell-things.git
synced 2025-01-22 10:04:34 +01:00
systemd-resolved: keep DNSSEC enabled
This commit is contained in:
parent
2022c99516
commit
b6ecd1b173
@ -1,6 +1,9 @@
|
|||||||
[Resolve]
|
[Resolve]
|
||||||
# https://github.com/systemd/systemd/issues/10579 & https://github.com/systemd/systemd/issues/9867
|
# https://github.com/systemd/systemd/issues/10579 & https://github.com/systemd/systemd/issues/9867
|
||||||
#DNSSEC=allow-downgrade
|
#DNSSEC=allow-downgrade
|
||||||
DNSSEC=no
|
# Regardless of the above DNS breaking issues when DNSSEC is
|
||||||
|
# enabled/opportunistic, it provides authentication which is important. TLS
|
||||||
|
# cannot be fully trusted. https://notes.valdikss.org.ru/jabber.ru-mitm/
|
||||||
|
DNSSEC=yes
|
||||||
DNSOverTLS=opportunistic
|
DNSOverTLS=opportunistic
|
||||||
Cache=yes
|
Cache=yes
|
||||||
|
@ -11,9 +11,9 @@ sudo systemctl restart systemd-resolved
|
|||||||
|
|
||||||
## Files explained
|
## Files explained
|
||||||
|
|
||||||
- `00-defaults.conf` - configuration not touching resolvers. Disables DNSSEC (as
|
- `00-defaults.conf` - configuration not touching resolvers. Enables DNSSEC
|
||||||
systemd-resolved doesn't handle it properly), enables opportunistic DoT and
|
(regardless of systemd-resolved not handling it properly), enables
|
||||||
caching.
|
opportunistic DoT and caching.
|
||||||
- `dot-*.conf` - configuration to use the DNS provider with DNS-over-TLS. If
|
- `dot-*.conf` - configuration to use the DNS provider with DNS-over-TLS. If
|
||||||
captive portals are a concern, `DNSOverTLS=no`.
|
captive portals are a concern, `DNSOverTLS=no`.
|
||||||
- `README.md` - you are reading it right now.
|
- `README.md` - you are reading it right now.
|
||||||
@ -33,10 +33,12 @@ sudo systemctl restart systemd-resolved
|
|||||||
potential downgrade attack. There are also captive portals, affecting
|
potential downgrade attack. There are also captive portals, affecting
|
||||||
`DNSOverTLS`. Both take `yes` or `no` or their own special option,
|
`DNSOverTLS`. Both take `yes` or `no` or their own special option,
|
||||||
for DNNSEC the `allow-downgrade`, for DNSOverTLS `opportunistic`.
|
for DNNSEC the `allow-downgrade`, for DNSOverTLS `opportunistic`.
|
||||||
|
- Then again when was any system that outdated to not have working DNSSEC?
|
||||||
|
- TODO: return to this configuration should that actually happen?
|
||||||
|
|
||||||
Other links I have found important and my files are based on:
|
Other links I have found important and my files are based on:
|
||||||
|
|
||||||
- https://wiki.archlinux.org/index.php/Systemd-resolved
|
- https://wiki.archlinux.org/index.php/Systemd-resolved
|
||||||
- Also provides the serious issues systemd-resolved+DNSSEC issues, https://github.com/systemd/systemd/issues/10579 & https://github.com/systemd/systemd/issues/9867
|
- Also provides the serious issues systemd-resolved+DNSSEC issues, https://github.com/systemd/systemd/issues/10579 & https://github.com/systemd/systemd/issues/9867
|
||||||
- request for strict DOT: https://github.com/systemd/systemd/issues/10755
|
- request for strict DoT: https://github.com/systemd/systemd/issues/10755
|
||||||
- vulnerable to MITM: https://github.com/systemd/systemd/issues/9397
|
- vulnerable to MITM: https://github.com/systemd/systemd/issues/9397
|
||||||
|
@ -4,7 +4,7 @@ DNS=127.0.0.1
|
|||||||
DNS=::1
|
DNS=::1
|
||||||
Domains=~.
|
Domains=~.
|
||||||
# Done better by Unbound, no failed-auxiliary (https://github.com/systemd/systemd/issues/9867)
|
# Done better by Unbound, no failed-auxiliary (https://github.com/systemd/systemd/issues/9867)
|
||||||
DNSSEC=no
|
#DNSSEC=no
|
||||||
# Not needed on localhost
|
# Not needed on localhost
|
||||||
DNSOverTLS=no
|
DNSOverTLS=no
|
||||||
# Done by Unbound
|
# Done by Unbound
|
||||||
|
Loading…
Reference in New Issue
Block a user