Problem looking up a few domains



  • I have DNSSEC, Harden DNSSEC data, and Harden Glue on.

    
    [2.2-RELEASE][admin@mydomain.co]/root: drill osha.gov
    ;; ->>HEADER<<- opcode: QUERY, rcode: SERVFAIL, id: 21456
    ;; flags: qr rd ra ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
    ;; QUESTION SECTION:
    ;; osha.gov.    IN      A
    
    ;; ANSWER SECTION:
    
    ;; AUTHORITY SECTION:
    
    ;; ADDITIONAL SECTION:
    
    ;; Query time: 669 msec
    ;; SERVER: 127.0.0.1
    ;; WHEN: Mon Mar  9 02:44:17 2015
    ;; MSG SIZE  rcvd: 26
    [2.2-RELEASE][admin@mydomain.co]/root: drill www.osha.gov
    ;; ->>HEADER<<- opcode: QUERY, rcode: SERVFAIL, id: 46673
    ;; flags: qr rd ra ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
    ;; QUESTION SECTION:
    ;; www.osha.gov.        IN      A
    
    ;; ANSWER SECTION:
    
    ;; AUTHORITY SECTION:
    
    ;; ADDITIONAL SECTION:
    
    ;; Query time: 723 msec
    ;; SERVER: 127.0.0.1
    ;; WHEN: Mon Mar  9 02:44:33 2015
    ;; MSG SIZE  rcvd: 30
    
    

    Any idea why I can't look those up?  If I use any other DNS server I get an answer.



  • So from what I see here, you're getting a failure when querying the local server. What if you query an external server instead? If you still get no respones, then the likely problem is with your gateway going out. If you get a response, then check the forwarders you've set in the local DNS service config.



  • @muswellhillbilly:

    So from what I see here, you're getting a failure when querying the local server. What if you query an external server instead? If you still get no respones, then the likely problem is with your gateway going out. If you get a response, then check the forwarders you've set in the local DNS service config.

    If I query remote server such as 4.2.2.2, I get a response.

    I don't have forwarders, I'm using unbound as a resolver.



  • I don't use Unbound myself- I'm more of a Bind man - but every DNS server has to have forwarders in order to resolve non-authoritative queries. Check your configuration and see where the entry is for putting in your forwarders. This is almost certainly going to be the cause of the issue.


  • LAYER 8 Global Moderator

    so it fails dnssec validation for one

    Found DNSKEY, but no RRSIG, for algorithm 7

    Which might be part of the problem.



  • @muswellhillbilly:

    I don't use Unbound myself- I'm more of a Bind man - but every DNS server has to have forwarders in order to resolve non-authoritative queries. Check your configuration and see where the entry is for putting in your forwarders. This is almost certainly going to be the cause of the issue.

    I'm not using any forwarders.  I'm using a resolver.  It should be going directly to the roots.

    so it fails dnssec validation for one

    Found DNSKEY, but no RRSIG, for algorithm 7

    Which might be part of the problem.

    Is this something on my end, or a misconfiguration on OSHA.gov's end?



  • Might be worth going through the steps outlined here: https://doc.pfsense.org/index.php/Unbound_DNS_Resolver#Configuration

    In particular, there is a sections which states:
    "Enable Forwarding Mode: Controls whether Unbound will query root servers directly (unchecked, disabled) or if queries will be forwarded to the upstream DNS servers defined under System > General or those obtained by DHCP/PPPoE/etc (checked, enabled). Forwarding mode may be enabled if the upstream DNS servers are trusted and also provide DNSSEC support. Forwarding mode is necessary for Multi-WAN Configurations. "

    So if you're failing to resolve hostnames against a root server, you could always test it using a public forwarder, such as '8.8.8.8', though from what I read you'd have to disable DNSSEC first.


  • Banned

    @Trel:

    Is this something on my end, or a misconfiguration on OSHA.gov's end?

    No, most certainly not on your end. http://dnssec-debugger.verisignlabs.com/osha.gov


  • LAYER 8 Global Moderator

    If you going to setup dnssec, you have to make sure you keep it updated and follow through that its working, etc.

    Its really sad, but it is also sad the lack of support for it with registrars and dns providers.  I put up a domain on dynadot to play with their dnssec support, and seems they do not allow different DS records pointing to the same key id.  Yet the way I read the rfc there should be no issue with your different DS records pointing to the same key using different hashes, for example the older sha-1 and the newer sha-256.. You would want the older one so older validators could still work, etc.  I can find multiple tlds with 2 DS records pointing to same key id, etc.

    As to this osha.gov - their dnssec seems broken, which means your resolver shouldn't hand out their info, so you get servfail from the resolver.  Might be nicer if they had some other error that says dnssec failure or something.  But if you turn off dnssec support it resolves just fine

    ;; OPT PSEUDOSECTION:
    ; EDNS: version: 0, flags:; udp: 4096
    ;; QUESTION SECTION:
    ;www.osha.gov.                  IN      A

    ;; ANSWER SECTION:
    www.osha.gov.          3600    IN      CNAME  www.osha.gov.edgekey.net.
    www.osha.gov.edgekey.net. 300  IN      CNAME  e6329.dscb.akamaiedge.net.
    e6329.dscb.akamaiedge.net. 20  IN      A      23.210.67.144

    But this sure seems to be on their end if you ask me.  See attached, dnssec off works fine, enable dnssec and servfail because their dnssec setup is not valid.




  • @johnpoz:

    If you going to setup dnssec, you have to make sure you keep it updated and follow through that its working, etc.

    Its really sad, but it is also sad the lack of support for it with registrars and dns providers.  I put up a domain on dynadot to play with their dnssec support, and seems they do not allow different DS records pointing to the same key id.  Yet the way I read the rfc there should be no issue with your different DS records pointing to the same key using different hashes, for example the older sha-1 and the newer sha-256.. You would want the older one so older validators could still work, etc.  I can find multiple tlds with 2 DS records pointing to same key id, etc.

    As to this osha.gov - their dnssec seems broken, which means your resolver shouldn't hand out their info, so you get servfail from the resolver.  Might be nicer if they had some other error that says dnssec failure or something.  But if you turn off dnssec support it resolves just fine

    ;; OPT PSEUDOSECTION:
    ; EDNS: version: 0, flags:; udp: 4096
    ;; QUESTION SECTION:
    ;www.osha.gov.                  IN      A

    ;; ANSWER SECTION:
    www.osha.gov.          3600    IN      CNAME  www.osha.gov.edgekey.net.
    www.osha.gov.edgekey.net. 300  IN      CNAME  e6329.dscb.akamaiedge.net.
    e6329.dscb.akamaiedge.net. 20  IN      A      23.210.67.144

    But this sure seems to be on their end if you ask me.  See attached, dnssec off works fine, enable dnssec and servfail because their dnssec setup is not valid.

    From PFSense, what needs to be done to keep DNSSec updated or did you mean on their end again?


  • Banned

    There is no issue with pfSense here. Move on.


  • LAYER 8 Global Moderator

    Their system, they have a broke dnssec config, anyone trying to validate it will fail.. Guess not a lot of people going there doing dnssec validation ;)

    Dok gave you the link that can check a domains dnssec setup - theirs fails..  So you would hope your dnssec enabled resolver would not resolve it.. So unbound is doing what it was asked do

    I just think it would be good idea when you do a query via like dig or drill to dns and the problem is with dnssec that it gives a different error other than servfail.  Not something pfsense would have anything to do with.,



  • @johnpoz:

    Their system, they have a broke dnssec config, anyone trying to validate it will fail.. Guess not a lot of people going there doing dnssec validation ;)

    Dok gave you the link that can check a domains dnssec setup - theirs fails..  So you would hope your dnssec enabled resolver would not resolve it.. So unbound is doing what it was asked do

    I just think it would be good idea when you do a query via like dig or drill to dns and the problem is with dnssec that it gives a different error other than servfail.  Not something pfsense would have anything to do with.,

    I agree there, it'd be nice to see something like DNSSECFAIL if it's failing on DNSSEC rather than just SERVFAIL which seems rather generic.
    So far this is the first case of legitimate domain failing to load for this reason that I've run into.  I switched to this setup after running into significant cache poisoning.


  • Banned

    @Trel:

    So far this is the first case of legitimate domain failing to load for this reason that I've run into.

    It's either signed properly, or it ain't legit… Needs to be fixed by the domain owner.



  • @doktornotor:

    @Trel:

    So far this is the first case of legitimate domain failing to load for this reason that I've run into.

    It's either signed properly, or it ain't legit… Needs to be fixed by the domain owner.

    I figured, but now… osha**.gov** 
    Maybe it'll work in a few years.


Log in to reply