From: Zbigniew Jędrzejewski-Szmek Date: Wed, 19 Jul 2023 12:16:15 +0000 (+0200) Subject: man: clarify DNSSEC= again X-Git-Tag: v254-rc3~23 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=e51846adc07fdcb8a4e9f1ef4e5c18076a73ccf7;p=thirdparty%2Fsystemd.git man: clarify DNSSEC= again https://github.com/systemd/systemd/pull/28407#issuecomment-1640900239 --- diff --git a/man/resolved.conf.xml b/man/resolved.conf.xml index df2a8599de1..d55d8194b37 100644 --- a/man/resolved.conf.xml +++ b/man/resolved.conf.xml @@ -138,27 +138,25 @@ DNSSEC= - Takes a boolean argument or - allow-downgrade. If true all DNS lookups are - DNSSEC-validated locally (excluding LLMNR and Multicast - DNS). If the response to a lookup request is detected to be invalid - a lookup failure is returned to applications. Note that - this mode requires a DNS server that supports DNSSEC. If the - DNS server does not properly support DNSSEC all validations - will fail. If set to allow-downgrade DNSSEC - validation is attempted, but if the server does not support - DNSSEC properly, DNSSEC mode is automatically disabled. Note - that this mode makes DNSSEC validation vulnerable to - "downgrade" attacks, where an attacker might be able to - trigger a downgrade to non-DNSSEC mode by synthesizing a DNS - response that suggests DNSSEC was not supported. If set to - false, DNS lookups are not DNSSEC validated and the resolver - becomes security-unaware. All forwarded queries have DNSSEC OK (DO) - bit unset. - - Note that DNSSEC validation requires retrieval of - additional DNS data, and thus results in a small DNS look-up - time penalty. + Takes a boolean argument or allow-downgrade. + + If set to true, all DNS lookups are DNSSEC-validated locally (excluding LLMNR and Multicast + DNS). If the response to a lookup request is detected to be invalid a lookup failure is returned to + applications. Note that this mode requires a DNS server that supports DNSSEC. If the DNS server does + not properly support DNSSEC all validations will fail. + + If set to allow-downgrade, DNSSEC validation is attempted, but if the server + does not support DNSSEC properly, DNSSEC mode is automatically disabled. Note that this mode makes + DNSSEC validation vulnerable to "downgrade" attacks, where an attacker might be able to trigger a + downgrade to non-DNSSEC mode by synthesizing a DNS response that suggests DNSSEC was not + supported. + + If set to false, DNS lookups are not DNSSEC validated. In this mode, or when set to + allow-downgrade and the downgrade has happened, the resolver becomes + security-unaware and all forwarded queries have DNSSEC OK (DO) bit unset. + + Note that DNSSEC validation requires retrieval of additional DNS data, and thus results in a + small DNS lookup time penalty. DNSSEC requires knowledge of "trust anchors" to prove data integrity. The trust anchor for the Internet root domain