I enabled DNSSEC via stubby.postconf:
Code:
#!/bin/sh
CONFIG=$1
source /usr/sbin/helper.sh
pc_insert " - GETDNS_TRANSPORT_TLS" "dnssec_return_status: GETDNS_EXTENSION_TRUE" $CONFIG
followed by a reboot.
Validate DNSSEC:
Code:
stubby -l
[14:57:06.647624] STUBBY: Read config from file /etc/stubby/stubby.yml
[14:57:06.648410] STUBBY: DNSSEC Validation is ON
[14:57:06.648601] STUBBY: Transport list is:
[14:57:06.648871] STUBBY: - TLS
[14:57:06.649121] STUBBY: Privacy Usage Profile is Strict (Authentication required)
[14:57:06.649244] STUBBY: (NOTE a Strict Profile only applies when TLS is the ONLY transport!!)
[14:57:06.649355] STUBBY: Starting DAEMON....
[14:57:14.201165] STUBBY: 9.9.9.9 : Conn opened: TLS - Strict Profile
[14:57:14.254501] STUBBY: 9.9.9.9 : Verify passed : TLS
<snip>
But the
drill -D command did not return the "ad" flag:
Code:
drill -D x3mtek.com
;; ->>HEADER<<- opcode: QUERY, rcode: SERVFAIL, id: 8578
;; flags: qr rd ra ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;; x3mtek.com. IN A
Reran drill adding the -T flag:
Code:
drill -DT x3mtek.com
;; Number of trusted keys: 2
;; Domain: .
[T] . 172800 IN DNSKEY 256 3 8 ;{id = 25266 (zsk), size = 2048b}
. 172800 IN DNSKEY 257 3 8 ;{id = 20326 (ksk), size = 2048b}
Checking if signing key is trusted:
New key: . 172800 IN DNSKEY
<snip>
I then reran drill with just the -D option and it now returns the "ad" flag which validates DNSSEC.
Code:
drill -D x3mtek.com
;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 11476
;; flags: qr rd ra ad ; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;; x3mtek.com. IN A
;; ANSWER SECTION:
x3mtek.com. 300 IN A 104.27.172.243
x3mtek.com. 300 IN A 104.27.173.243
<snip>

Well, at least it seems to work now and validating with the "ad" flag. I did another drill -D a few minutes later and the "ad" flag was there.
https://linux.die.net/man/1/drill