Thanks for the confirmation that the problem was related to DNSSEC.

I didn't see your message until I got home from work; however, I did find the 
root of the problem late this afternoon.  At each of our Internet egress and 
ingress points, we have Cisco ASA devices sitting in front of a pair of 
redundant firewalls.  Each ASA is configured with the default DNS inspect 
policy that doesn't accept fragmented UDP packets.


On Jul 22, 2010, at 9:42 AM, Nicholas Wheeler wrote:

> Hello,
> 
>    From what I can see, radar.weather.gov is currently unsigned. There's a 
> KSK, but I see no ZSKs, and cannot complete the chain of trust.
> 
>    On the other hand, noaa.gov is a signed zone, and I can complete the chain 
> of trust. It does not seem like the usadotgov.net root name servers have a 
> problem.
> 
>    If you would like to test, this is the tool used by dotgov.gov's helpdesk 
> to test DNSSEC. Unfortunately, it's not a very good website.
> 
> http://www.dnssecreport.com/DNSSECReport/DNSKeyReport.aspx
> 
> Thanks,
> 
>    -- Nicholas Wheeler
> 
> Merton Campbell Crockett wrote:
>> Does anyone know if there have been problems with the USADOTGOV.NET 
>> <http://USADOTGOV.NET> root name servers today?
>> We've had people complaining about resolving RADAR.WEATHER.GOV 
>> <http://RADAR.WEATHER.GOV> and several systems in the NOAA.GOV 
>> <http://NOAA.GOV> domain.  If you query for the NS resource records, you 
>> only receive the ANSWER section.  The ADDITIONAL section with the addresses 
>> is missing.
>> --
>> Merton Campbell Crockett
>> m.c.crock...@roadrunner.com <mailto:m.c.crock...@roadrunner.com>

--
Merton Campbell Crockett
m.c.crock...@roadrunner.com




_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to