diff --git a/src/resolve/resolved-dns-transaction.c b/src/resolve/resolved-dns-transaction.c index f78bf0702b235..a162a91a03379 100644 --- a/src/resolve/resolved-dns-transaction.c +++ b/src/resolve/resolved-dns-transaction.c @@ -3071,16 +3071,6 @@ static int dns_transaction_requires_nsec(DnsTransaction *t) { name = dns_resource_key_name(dns_transaction_key(t)); - if (IN_SET(dns_transaction_key(t)->type, DNS_TYPE_DS, DNS_TYPE_CNAME, DNS_TYPE_DNAME)) { - /* We got a negative reply for this DS/CNAME/DNAME lookup? Check the parent in this case to - * see if this answer should have been signed. */ - r = dns_name_parent(&name); - if (r < 0) - return r; - if (r == 0) - return true; - } - /* For all other RRs we check the DS on the same level to see * if it's signed. */ diff --git a/test/units/TEST-75-RESOLVED.sh b/test/units/TEST-75-RESOLVED.sh index 4f387203e2eda..5ea490d40f7e6 100755 --- a/test/units/TEST-75-RESOLVED.sh +++ b/test/units/TEST-75-RESOLVED.sh @@ -456,6 +456,8 @@ testcase_08_resolved() { grep -qF "15 mail.unsigned.test." "$RUN_OUT" run resolvectl query --legend=no -t MX unsigned.test grep -qF "unsigned.test IN MX 15 mail.unsigned.test" "$RUN_OUT" + run dig @ns1.unsigned.test +noall +comments unsigned.test CNAME + grep -qF "status: NOERROR" "$RUN_OUT" : "--- ZONE: signed.test (static DNSSEC) ---" # Check the trust chain (with and without systemd-resolved in between