Hi Bob.
See if this article helps any first, before we get into configs: 
https://kb.isc.org/docs/the-umbrella-feature-in-detail

Cheers, Greg

> On 16 Oct 2024, at 14:55, Robert Mankowski <robert.mankow...@hotmail.com> 
> wrote:
> 
> I recently implemented a forward only BIND server for home. I was forwarding 
> to OpenDNS FamilyShield using TLS and DNSSEC at first, but I was getting a 
> noticeable amount of SERVFAIL responses. I believe it is related to DNSSEC 
> (see delv tests below), but I don’t believe it is my configuration because 
> when I forward to Cloudflare’s Family service, or to Google DNS, I don’t have 
> any problems with the same domains (e.g. www.cdc.gov <http://www.cdc.gov/>).
>  
> I contacted Cisco Umbrella support because I was thinking it’s an issue with 
> their servers, but they didn’t really help, so I thought I would try this 
> list for advice.
>  
> Would appreciate it if someone could review my configuration and/or reproduce 
> my results to see if I’m doing something wrong.
>  
> Thanks,
>  
> Bob
>  
> Here are some tests I ran:
>  
> admin@router1:~$ apt-cache policy bind9
> bind9:
>   Installed: 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7
>   Candidate: 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7
>   Version table:
> *** 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7 500
>         500 https://packages.sury.org/bind-dev bookworm/main amd64 Packages
>         100 /var/lib/dpkg/status
>      1:9.18.28-1~deb12u2 500
>         500 http://deb.debian.org/debian bookworm/main amd64 Packages
>         500 http://security.debian.org/debian-security bookworm-security/main 
> amd64 Packages
>  
>  
> admin@router1:~$ delv -v
> delv 9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7-Debian
>  
> admin@router1:~$ delv -4 @208.67.220.123 www.cdc.gov <http://www.cdc.gov/>. A
> ;; insecurity proof failed resolving 'cdc.gov/DNSKEY/IN': 
> <http://cdc.gov/DNSKEY/IN':> 208.67.220.123#53
> ;; broken trust chain resolving 'www.cdc.gov/A/IN': 
> <http://www.cdc.gov/A/IN':> 208.67.220.123#53
> ;; resolution failed: broken trust chain
>  
> admin@router1:~$ delv -4 @208.67.222.123 www.cdc.gov <http://www.cdc.gov/>. A
> ;; insecurity proof failed resolving 'cdc.gov/DNSKEY/IN': 
> <http://cdc.gov/DNSKEY/IN':> 208.67.222.123#53
> ;; broken trust chain resolving 'www.cdc.gov/A/IN': 
> <http://www.cdc.gov/A/IN':> 208.67.222.123#53
> ;; resolution failed: broken trust chain
>  
> admin@router1:~$ delv -4 @1.1.1.3 www.cdc.gov <http://www.cdc.gov/>. A
> ; fully validated
> www.cdc.gov <http://www.cdc.gov/>.            248     IN      CNAME   
> www.akam.cdc.gov <http://www.akam.cdc.gov/>.
> www.cdc.gov <http://www.cdc.gov/>.            248     IN      RRSIG   CNAME 8 
> 3 300 20241019153420 20241009150230 1503 cdc.gov <http://cdc.gov/>. 
> b99UIGmCOTJj+C7JFXORmtUXQEIIGdF0q3Z5u6HfAbKcJhjfFjJrkRE6 
> yntzr0pSksCp1Uwi146xvKz7ImCqkYK67/WlOujyquOGSfgOwO1DvUyj 
> TfvXJWvjSRLTx30lwU6RV80RrC596A16anTpLc7Zi4VEAVncRHeUl1y1 
> /MG/CSCtE/Ef6tPD1FtGZjhXszVAgrk3fhISCsImRHuGAoIBnIKCKx2M 
> YMhxirfV0z9Qq46PnW9zTzh+EbVKZkN0C+Xl3j2+4sqyHlubhrtgklG/ 
> g0u+99/g/jdfex+Vh7dtcAXFcTZ1XGuPQXgsn6GrznecB8PaXmCxXfft GaDOdQ==
> www.akam.cdc.gov <http://www.akam.cdc.gov/>.       20      IN      A       
> 23.51.224.222
> www.akam.cdc.gov <http://www.akam.cdc.gov/>.       20      IN      RRSIG   A 
> 10 4 20 20241018102927 20241015092927 16701 akam.cdc.gov 
> <http://akam.cdc.gov/>. 
> Lcd7WthqqU+A7UwQkBHZsT0nqxztJkn9cx57wXr4eHHCvJR0cCxZFkwl 
> eIbSffPIu364terXJlcEvuWbWTLrCX7bo0c6B9bA5EPi2DsbegTfkG5u 
> cqrZP9RTzXbfbs5l5w6CQ9DfSPcYx9BIYkusErQu5qQnGhoQ5bXI1VxT Otc=
>  
> The relevant portion of my named configuration is:
>  
> tls opendns-tls {
>     remote-hostname "dns.opendns.com <http://dns.opendns.com/>";
> };
>  
> tls cloudflare_family-tls {
>     remote-hostname "one.one.one.one";
> };
>  
> tls google-tls {
> };
>  
> tls router1-tls {
>     key-file "/var/cache/bind/privkey.pem";
>     cert-file "/var/cache/bind/fullchain.pem";
>     dhparam-file "/var/cache/bind/dhparam.pem";
>     ciphers 
> "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
>     prefer-server-ciphers yes;
>     session-tickets no;
> };
>  
> options {
>     directory "/var/cache/bind";
>     recursion yes;
>     allow-query { trusted_nets; };
>     version "none";
>  
>     forwarders {
> #        1.1.1.3 port 853 tls cloudflare_family-tls;
> #        1.0.0.3 port 853 tls cloudflare_family-tls;
>         208.67.222.123 port 853 tls opendns-tls;
>         208.67.220.123 port 853 tls opendns-tls;
> #       8.8.8.8 port 853 tls google-tls;
> #       8.8.4.4 port 853 tls google-tls;
>     };
>  
>     forward only;
>  
>     allow-transfer { none; };
>  
>     dnssec-validation auto;
>  
>     listen-on port 443 tls router1-tls http default { trusted_interfaces; };
>     listen-on port 853 tls router1-tls { trusted_interfaces; };
>     listen-on { trusted_interfaces; };
>     listen-on-v6 { none; };
>  
>     zone-statistics yes ;
> };
>  
>  
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org <mailto:bind-users@lists.isc.org>
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to