Second thought on this topic:

are the BIND EDNS messages rather related to

gr/DNSKEY (alg 8, id 13987): No response was received until the UDP payload 
size was decreased, indicating that the server might be attempting to send a 
payload that exceeds the path maximum transmission unit (PMTU) size. 
(139.91.191.3, 2001:648:2c30::191:3, UDP_-_EDNS0_4096_D_KN)
gr/DNSKEY (alg 8, id 45264): No response was received until the UDP payload 
size was decreased, indicating that the server might be attempting to send a 
payload that exceeds the path maximum transmission unit (PMTU) size. 
(139.91.191.3, 2001:648:2c30::191:3, UDP_-_EDNS0_4096_D_KN)

as indicated by https://dnsviz.net/d/physics.uoi.gr/dnssec/ ?

I guess so.  

So with BIND 9.19 all queries using 139.91.191.3 will fail, but other NS will 
answer successfully ?


> On 09/05/2022 13:19 Veronique Lefebure <veronique.lefeb...@cern.ch> wrote:
> 
>  
> Hello,
> 
> Now we are investigating another case:
> 
> On our internal DNS server we see :
> 
> 08-May-2022 20:48:14.248 edns-disabled: info: success resolving 
> 'grid31.physics.uoi.gr/A' (in '.'?) after reducing the advertised EDNS UDP 
> packet size to 512 octets
> 08-May-2022 20:48:14.249 edns-disabled: info: success resolving 
> 'grid31.physics.uoi.gr/AAAA' (in '.'?) after reducing the advertised EDNS UDP 
> packet size to 512 octets
> 
> and on our external cache DNS server we see:
> 
> 03-May-2022 20:47:40.934 edns-disabled: info: success resolving 
> 'grid31.physics.uoi.gr/AAAA' (in 'physics.uoi.gr'?) after disabling EDNS
> 03-May-2022 20:47:40.937 edns-disabled: info: success resolving 
> 'grid31.physics.uoi.gr/A' (in 'physics.uoi.gr'?) after disabling EDNS
> 
> Looking into our detailed logs, it seems to us that the root cause of the 
> problem for this domain is that the DNS server used by physics.uoi.gr don't 
> reply over ipv6, and that our DNS servers finally get an answer when they 
> query the ipv4 NS.
> 
> This seems also to be confirmed by 
> https://dnsviz.net/d/physics.uoi.gr/dnssec/ (really great tool !).
> 
> If the problem is simply ipv6, is it correct to say that the BIND messages 
> above are misleading ?
> Or is there really a EDNS-related issue ?
> 
> Thanks again,
> Veronique
> 
> 
> > On 05/05/2022 03:01 Mark Andrews <ma...@isc.org> wrote:
> > 
> >  
> > > On 5 May 2022, at 00:17, Veronique Lefebure <veronique.lefeb...@cern.ch> 
> > > wrote:
> > > 
> > > Thanks Greg and Ondrej,
> > > 
> > > Many thanks for the pointer to DNS Cookies in BIND 9 (isc.org)
> > > 
> > > I have used https://ednscomp.isc.org/ednscomp/1ba42afa27 to check if  
> > > they are compliant, but the answer is ambiguous:
> > > 
> > > EDNS Compliance Tester
> > > Checking: 'sour.woinsta.com' as at 2022-05-04T13:45:39Z
> > > sour.woinsta.com.: NS lookup failed
> > > Codes
> > >   • ok - test passed.
> > 
> > Use the zone name ‘woinsta.com’.  The site asks for the zone name not an 
> > arbitrary zone name.
> > That said we make need to tweak the nameserver settings the tester is using 
> > to get the initial
> > NS lookup to succeed with broken servers like this.
> > 
> > > Anyway, from what you have seen you are suspecting that the problem is on 
> > > the woinsta.com side and not on our side ?
> > > 
> > > The following indeed indicates a problem related to cookies:
> > > 
> > > dig @ns1.thednscloud.com. +nocookie sour.woinsta.com A +short 
> > > 23.82.12.29 
> > > 
> > > while 
> > > 
> > > dig @ns1.thednscloud.com. +cookie sour.woinsta.com A +short
> > > ; <<>> DiG 9.11.36 <<>> @ns1.thednscloud.com. +cookie sour.woinsta.com A 
> > > +short 
> > > ; (2 servers found) 
> > > ;; global options: +cmd 
> > > ;; connection timed out; no servers could be reached 
> > 
> > The servers will echo back a COOKIE option that has both the client and a 
> > server cookie present.
> > 
> > % dig sour.woinsta.com ns @23.82.12.27 +norec 
> > +cookie=44fd7abd853763e60100000062731621e76cd1b746056de3 +qr
> > 
> > ; <<>> DiG 9.17.22 <<>> sour.woinsta.com ns @23.82.12.27 +norec 
> > +cookie=44fd7abd853763e60100000062731621e76cd1b746056de3 +qr
> > ;; global options: +cmd
> > ;; Sending:
> > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2072
> > ;; flags: ad; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
> > 
> > ;; OPT PSEUDOSECTION:
> > ; EDNS: version: 0, flags:; udp: 1232
> > ; COOKIE: 44fd7abd853763e60100000062731621e76cd1b746056de3
> > ;; QUESTION SECTION:
> > ;sour.woinsta.com.          IN      NS
> > 
> > ;; QUERY SIZE: 73
> > 
> > ;; Got answer:
> > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2072
> > ;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
> > 
> > ;; OPT PSEUDOSECTION:
> > ; EDNS: version: 0, flags:; udp: 1232
> > ; COOKIE: 44fd7abd853763e60100000062731621e76cd1b746056de3 (good)
> > ;; QUESTION SECTION:
> > ;sour.woinsta.com.          IN      NS
> > 
> > ;; AUTHORITY SECTION:
> > woinsta.com.                300     IN      SOA     ns1.emu-dns.com. 
> > admin.woinsta.com. 2022020800 86400 10800 604800 300
> > 
> > ;; Query time: 236 msec
> > ;; SERVER: 23.82.12.27#53(23.82.12.27) (UDP)
> > ;; WHEN: Thu May 05 10:16:25 AEST 2022
> > ;; MSG SIZE  rcvd: 127
> > 
> > % 
> > 
> > I suspect a stupid firewall in front of it that thinks it knows what is a 
> > valid COOKIE option is
> > but really it doesn’t.  The firewall then did the stupid thing of dropping 
> > the request.  The correct
> > protocol response to an invalid EDNS option is FORMERR with an OPT record 
> > present if you understand
> > EDNS.  If you don’t understand EDNS the correct response to EDNS is FORMERR 
> > *without* an OPT record
> > being present or just ignore the OPT record.
> > 
> > Too many servers don’t know how to construct a valid FORMERR response.  You 
> > DO NOT just copy the
> > request, set rcode to FORMERR and QR to 1 and send the resulting message.  
> > Why would you send what
> > you believe is garbage to the client?  The DNS message has a well defined 
> > header which identifies
> > the request / response.  Construct a valid response header based on the 
> > header in the request and
> > set the rcode to FORMERR.  Zero out the response header, copy the ID and 
> > OPCODE fields.  Copy any
> > header bits that you know are supposed to be copied.  Set the RCODE field 
> > to FORMERR.  If it was
> > a QUERY, and you understood the QUESTION section, you can copy that as well 
> > updating the QUESTION
> > count.
> > 
> > Basically there is a broken firewall and a broken DNS server here.  Both 
> > need to be fixed.
> > 
> > Mark
> > 
> > > I will try send-cookie no for that server to confirm it is the source of 
> > > the issue.
> > > 
> > > Cheers,
> > > Veronique
> > > 
> > >> On 04/05/2022 14:34 Greg Choules <gregchoules+bindus...@googlemail.com> 
> > >> wrote:
> > >> 
> > >> 
> > >> Hi Veronique. 
> > >> Every DNS server should support EDNS by now. It has been around for a 
> > >> very long time. Even if it doesn't support EDNS it should ignore it.
> > >> 
> > >> I made some test queries and packet captures to 23.82.12.28. Whatever 
> > >> this box is, please talk to the manufacturer about EDNS support. 
> > >> Or.. it may be that some network infrastructure - firewalls are usually 
> > >> the first place to look - is blocking this traffic.     
> > >> 
> > >> Whatever is happening at the authoritative end, it needs to be fixed. 
> > >> All modern recursive servers will use EDNS.
> > >> 
> > >> Cheers, Greg
> > > -- 
> > > Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> > > from this list
> > > 
> > > ISC funds the development of this software with paid support 
> > > subscriptions. Contact us at https://www.isc.org/contact/ for more 
> > > information.
> > > 
> > > 
> > > bind-users mailing list
> > > bind-users@lists.isc.org
> > > https://lists.isc.org/mailman/listinfo/bind-users
> > 
> > -- 
> > Mark Andrews, ISC
> > 1 Seymour St., Dundas Valley, NSW 2117, Australia
> > PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to