<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
<span style="display: inline !important; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);" class="ContentPasted0">Hello I'm a student in my last year of the Master in Cybersecurity at ULB. As part of my thesis, I'm doing research to develop a DNS
Amplification scenario that will eventually be deployed within a Cyber Range. I have to carry out various measurements and develop different attacks in a virtual environment. I've already been able to set up my entire environment in VirtualBox for DNS (i.e.
without DNSSEC). Now I need to deploy DNSSEC on my server. I've managed to generate my key pairs and sign my DNS zones. However, when I try to do a dig from my client VM, I get a SERVFAIL. I think this is because the chain of trust can't be established, which
in my case is perfectly normal as I'm in an isolated test environment. So how can I deploy DNSSEC correctly so that the chain of trust is not taken into account and it works in my virtual environment? I think I know how DNSSEC works, but if you also have any
clarification to offer, I'd be delighted to hear from you. My BIND server runs on an Ubuntu22.04 Jammy Jellyfish VM.</span>
<div style="margin: 0px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);">
<br class="x_ContentPasted0 ContentPasted0">
</div>
<div class="x_ContentPasted0 ContentPasted0" style="margin: 0px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);">
Thanks in advance for your help.</div>
</div>
</body>
</html>