]> git.ipfire.org Git - thirdparty/systemd.git/commit - NEWS
resolved: turn on DNSSEC by default, unless configured otherwise
authorLennart Poettering <lennart@poettering.net>
Mon, 15 Feb 2016 17:40:02 +0000 (18:40 +0100)
committerLennart Poettering <lennart@poettering.net>
Tue, 16 Feb 2016 14:22:05 +0000 (15:22 +0100)
commit61ecb465b1c803316cb55bae0c2d7cf3c0008589
tree4ff4d283b4a55458a2107b8484cbbfd991c8d523
parent6043679c6ec485a96926f07c26d77f2c0c246fe2
resolved: turn on DNSSEC by default, unless configured otherwise

Let's make sure DNSSEC gets more testing, by defaulting DNSSEC to
"allow-downgrade" mode. Since distros should probably not ship DNSSEC enabled
by default add a configure switch to disable this again.

DNSSEC in "allow-downgrade" mode should mostly work without affecting user
experience. There's one exception: some captive portal systems rewrite DNS in
order to redirect HTTP traffic to the captive portal. If these systems
implement DNS servers that are otherwise DNSSEC-capable (which in fact is
pretty unlikely, but still...), then this will result in the captive portal
being inaccessible. To fix this support in NetworkManager (or any other network
management solution that does captive portal detection) is required, which
simply turns off DNSSEC during the captive portal detection, and resets it back
to the default (i.e. on) after captive portal authentication is complete.
Makefile.am
NEWS
configure.ac
src/resolve/resolved-manager.c
src/resolve/resolved.conf.in