> > > Named should be sending queries with DO=1 and it should be getting back > signed responses. I suspect that you will need to run packet captures of > the traffic to and from 162.140.15.100 and 162.140.254.200 port 53 from the > nameserver. Either signed responses will cease or DNSSEC requests will > cease. In either case having the traffic around the transition should > help to determine what is happening. > > I've found that, after a fresh restart of named, if I query for " federalregister.gov A" I get a good AD response, and then subsequent queries for "www.federalregister.gov" are successful as well. If however after a restart of named I begin with a query for www.federalregister.gov A then I get servfail, and subsequent queries for federealregister.gov servfail as well. Here is the tcpdump from the 2nd (failed) case of an initial query for www.federalregister.gov:
reading from file dns.cap, link-type EN10MB (Ethernet), snapshot length 262144 04:30:01.114458 IP (tos 0x0, ttl 64, id 35832, offset 0, flags [none], proto UDP (17), length 92) 10.0.0.159.43263 > 162.140.254.200.53: [udp sum ok] 15013 [1au] A? www.federalregister.gov. ar: . OPT UDPsize=512 DO [COOKIE 352538a87bde87a5] (64) 04:30:01.204863 IP (tos 0x0, ttl 229, id 4936, offset 0, flags [DF], proto UDP (17), length 80) 162.140.254.200.53 > 10.0.0.159.43263: [udp sum ok] 15013*-| q: A? www.federalregister.gov. 3/0/1 . OPT UDPsize=4096 DO [|domain] 04:30:01.205350 IP (tos 0x0, ttl 64, id 43065, offset 0, flags [none], proto UDP (17), length 69) 10.0.0.159.59699 > 162.140.254.200.53: [udp sum ok] 50396 A? www.federalregister.gov. (41) 04:30:01.325033 IP (tos 0x0, ttl 229, id 61678, offset 0, flags [DF], proto UDP (17), length 141) 162.140.254.200.53 > 10.0.0.159.59699: [udp sum ok] 50396*- q: A? www.federalregister.gov. 2/2/0 www.federalregister.gov. A 99.83.174.136, www.federalregister.gov. A 75.2.36.59 ns: federalregister.gov. NS ns3.gpo.gov., federalregister.gov. NS ns4.gpo.gov. (113) 04:30:01.706532 IP (tos 0x0, ttl 64, id 13071, offset 0, flags [none], proto UDP (17), length 92) 10.0.0.159.40399 > 162.140.15.100.53: [udp sum ok] 59408 [1au] DS? www.federalregister.gov. ar: . OPT UDPsize=512 DO [COOKIE bcd54232244c075a] (64) 04:30:01.823027 IP (tos 0x0, ttl 230, id 41740, offset 0, flags [DF], proto UDP (17), length 80) 162.140.15.100.53 > 10.0.0.159.40399: [udp sum ok] 59408*-| q: DS? www.federalregister.gov. 0/2/1 ns: . OPT UDPsize=4096 DO [|domain] 04:30:01.826975 IP (tos 0x0, ttl 64, id 29142, offset 0, flags [none], proto UDP (17), length 69) 10.0.0.159.41463 > 162.140.15.100.53: [udp sum ok] 53452 DS? www.federalregister.gov. (41) 04:30:01.958188 IP (tos 0x0, ttl 230, id 41744, offset 0, flags [DF], proto UDP (17), length 149) 162.140.15.100.53 > 10.0.0.159.41463: [udp sum ok] 53452*- q: DS? www.federalregister.gov. 0/1/0 ns: federalregister.gov. SOA ins1.gpo.gov. please_set_email.absolutely.nowhere. 2542629 10800 1080 2592000 900 (121) 04:30:01.960633 IP (tos 0x0, ttl 64, id 61049, offset 0, flags [none], proto UDP (17), length 69) 10.0.0.159.47806 > 162.140.254.200.53: [udp sum ok] 3265 DS? www.federalregister.gov. (41) 04:30:02.093679 IP (tos 0x0, ttl 229, id 61713, offset 0, flags [DF], proto UDP (17), length 149) 162.140.254.200.53 > 10.0.0.159.47806: [udp sum ok] 3265*- q: DS? www.federalregister.gov. 0/1/0 ns: federalregister.gov. SOA ins1.gpo.gov. please_set_email.absolutely.nowhere. 2542629 10800 1080 2592000 900 (121) 04:30:02.095216 IP (tos 0x0, ttl 64, id 53735, offset 0, flags [none], proto UDP (17), length 57) 10.0.0.159.44320 > 162.140.15.100.53: [udp sum ok] 27093 AAAA? ns4.gpo.gov. (29) 04:30:02.099567 IP (tos 0x0, ttl 64, id 23890, offset 0, flags [none], proto UDP (17), length 57) 10.0.0.159.49556 > 162.140.15.100.53: [udp sum ok] 11719 AAAA? ns3.gpo.gov. (29) 04:30:02.229242 IP (tos 0x0, ttl 230, id 56543, offset 0, flags [DF], proto UDP (17), length 102) 162.140.15.100.53 > 10.0.0.159.44320: [udp sum ok] 27093*- q: AAAA? ns4.gpo.gov. 0/1/0 ns: gpo.gov. SOA ins1.gpo.gov. noc.gpo.gov. 2010073218 10800 3600 2592000 900 (74) 04:30:02.229459 IP (tos 0x0, ttl 230, id 56542, offset 0, flags [DF], proto UDP (17), length 102) 162.140.15.100.53 > 10.0.0.159.49556: [udp sum ok] 11719*- q: AAAA? ns3.gpo.gov. 0/1/0 ns: gpo.gov. SOA ins1.gpo.gov. noc.gpo.gov. 2010073218 10800 3600 2592000 900 (74) Here is the tcpdump from the 1st successful case of an initial query for federalregister.gov: 04:39:02.838690 IP (tos 0x0, ttl 64, id 27981, offset 0, flags [none], proto UDP (17), length 88) 10.0.0.159.41336 > 162.140.15.100.53: [udp sum ok] 45611 [1au] A? federalregister.gov. ar: . OPT UDPsize=512 DO [COOKIE 09372246c1a6d91c] (60) 04:39:02.924319 IP (tos 0x0, ttl 230, id 28551, offset 0, flags [DF], proto UDP (17), length 506) 162.140.15.100.53 > 10.0.0.159.41336: [udp sum ok] 45611*- q: A? federalregister.gov. 3/3/1 federalregister.gov. A 75.2.36.59, federalregister.gov. A 99.83.174.136, federalregister.gov. RRSIG ns: federalregister.gov. NS ns4.gpo.gov., federalregister.gov. NS ns3.gpo.gov., federalregister.gov. RRSIG ar: . OPT UDPsize=4096 DO (478) 04:39:02.925207 IP (tos 0x0, ttl 64, id 22272, offset 0, flags [none], proto UDP (17), length 88) 10.0.0.159.36187 > 162.140.254.200.53: [udp sum ok] 44463 [1au] DNSKEY? federalregister.gov. ar: . OPT UDPsize=512 DO [COOKIE cc687621d8684958] (60) 04:39:03.008409 IP (tos 0x0, ttl 229, id 32759, offset 0, flags [DF], proto UDP (17), length 76) 162.140.254.200.53 > 10.0.0.159.36187: [udp sum ok] 44463*-| q: DNSKEY? federalregister.gov. 0/0/1 ar: . OPT UDPsize=4096 DO (48) 04:39:03.008785 IP (tos 0x0, ttl 64, id 53226, offset 0, flags [none], proto TCP (6), length 60) 10.0.0.159.55681 > 162.140.254.200.53: Flags [S], cksum 0x5d5f (correct), seq 4261541886, win 64240, options [mss 1460,sackOK,TS val 682249050 ecr 0,nop,wscale 7], length 0 04:39:03.095133 IP (tos 0x0, ttl 229, id 32783, offset 0, flags [DF], proto TCP (6), length 60) 162.140.254.200.53 > 10.0.0.159.55681: Flags [S.], cksum 0x7ae4 (correct), seq 1529080310, ack 4261541887, win 13800, options [mss 1380,nop,wscale 0,sackOK,TS val 3817897758 ecr 682249050], length 0 04:39:03.095209 IP (tos 0x0, ttl 64, id 53227, offset 0, flags [none], proto TCP (6), length 52) 10.0.0.159.55681 > 162.140.254.200.53: Flags [.], cksum 0xdcf5 (correct), seq 1, ack 1, win 502, options [nop,nop,TS val 682249136 ecr 3817897758], length 0 04:39:03.095408 IP (tos 0x0, ttl 64, id 53228, offset 0, flags [none], proto TCP (6), length 114) 10.0.0.159.55681 > 162.140.254.200.53: Flags [P.], cksum 0x0a81 (correct), seq 1:63, ack 1, win 502, options [nop,nop,TS val 682249137 ecr 3817897758], length 62 22096 [1au] DNSKEY? federalregister.gov. ar: . OPT UDPsize=1232 DO [COOKIE cc687621d8684958] (60) 04:39:03.183481 IP (tos 0x0, ttl 229, id 32793, offset 0, flags [DF], proto TCP (6), length 52) 162.140.254.200.53 > 10.0.0.159.55681: Flags [.], cksum 0xa82a (correct), seq 1, ack 63, win 13862, options [nop,nop,TS val 3817897850 ecr 682249137], length 0 04:39:03.187960 IP (tos 0x0, ttl 229, id 32794, offset 0, flags [DF], proto TCP (6), length 1160) 162.140.254.200.53 > 10.0.0.159.55681: Flags [P.], cksum 0xca8d (correct), seq 1:1109, ack 63, win 13862, options [nop,nop,TS val 3817897850 ecr 682249137], length 1108 22096*- q: DNSKEY? federalregister.gov. 5/0/1 federalregister.gov. DNSKEY, federalregister.gov. DNSKEY, federalregister.gov. DNSKEY, federalregister.gov. RRSIG, federalregister.gov. RRSIG ar: . OPT UDPsize=4096 DO (1106) 04:39:03.187995 IP (tos 0x0, ttl 64, id 53229, offset 0, flags [none], proto TCP (6), length 52) 10.0.0.159.55681 > 162.140.254.200.53: Flags [.], cksum 0xd7ab (correct), seq 63, ack 1109, win 501, options [nop,nop,TS val 682249229 ecr 3817897850], length 0 04:39:03.189604 IP (tos 0x0, ttl 64, id 53230, offset 0, flags [none], proto TCP (6), length 52) 10.0.0.159.55681 > 162.140.254.200.53: Flags [F.], cksum 0xd7a8 (correct), seq 63, ack 1109, win 501, options [nop,nop,TS val 682249231 ecr 3817897850], length 0 04:39:03.486320 IP (tos 0x0, ttl 64, id 53231, offset 0, flags [none], proto TCP (6), length 52) 10.0.0.159.55681 > 162.140.254.200.53: Flags [F.], cksum 0xd67f (correct), seq 63, ack 1109, win 501, options [nop,nop,TS val 682249528 ecr 3817897850], length 0 Both dumps were filtered to only traffic to/from the authoritative servers 162.140.15.100 and 162.140.254.200. This particular system is running 9.16.33-Raspbian.
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users