Thanks Greg. That is very helpful. Sorry I didn't find that article on my own.
Bob From: Greg Choules <g...@isc.org> Sent: Wednesday, October 16, 2024 10:10 AM To: Robert Mankowski <robert.mankow...@hotmail.com> Cc: bind-users@lists.isc.org Subject: Re: DNSSEC, OpenDNS and www.cdc.gov Hi Bob. See if this article helps any first, before we get into configs: https://kb.isc.org/docs/the-umbrella-feature-in-detail Cheers, Greg On 16 Oct 2024, at 14:55, Robert Mankowski <robert.mankow...@hotmail.com<mailto:robert.mankow...@hotmail.com>> wrote: I recently implemented a forward only BIND server for home. I was forwarding to OpenDNS FamilyShield using TLS and DNSSEC at first, but I was getting a noticeable amount of SERVFAIL responses. I believe it is related to DNSSEC (see delv tests below), but I don't believe it is my configuration because when I forward to Cloudflare's Family service, or to Google DNS, I don't have any problems with the same domains (e.g. www.cdc.gov<http://www.cdc.gov/>). I contacted Cisco Umbrella support because I was thinking it's an issue with their servers, but they didn't really help, so I thought I would try this list for advice. Would appreciate it if someone could review my configuration and/or reproduce my results to see if I'm doing something wrong. Thanks, Bob Here are some tests I ran: admin@router1:~$ apt-cache policy bind9 bind9: Installed: 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7 Candidate: 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7 Version table: *** 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7 500 500 https://packages.sury.org/bind-dev bookworm/main amd64 Packages 100 /var/lib/dpkg/status 1:9.18.28-1~deb12u2 500 500 http://deb.debian.org/debian bookworm/main amd64 Packages 500 http://security.debian.org/debian-security bookworm-security/main amd64 Packages admin@router1:~$ delv -v delv 9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7-Debian admin@router1:~$ delv -4 @208.67.220.123 www.cdc.gov<http://www.cdc.gov/>. A ;; insecurity proof failed resolving 'cdc.gov/DNSKEY/IN':<http://cdc.gov/DNSKEY/IN':> 208.67.220.123#53 ;; broken trust chain resolving 'www.cdc.gov/A/IN':<http://www.cdc.gov/A/IN':> 208.67.220.123#53 ;; resolution failed: broken trust chain admin@router1:~$ delv -4 @208.67.222.123 www.cdc.gov<http://www.cdc.gov/>. A ;; insecurity proof failed resolving 'cdc.gov/DNSKEY/IN':<http://cdc.gov/DNSKEY/IN':> 208.67.222.123#53 ;; broken trust chain resolving 'www.cdc.gov/A/IN':<http://www.cdc.gov/A/IN':> 208.67.222.123#53 ;; resolution failed: broken trust chain admin@router1:~$ delv -4 @1.1.1.3 www.cdc.gov<http://www.cdc.gov/>. A ; fully validated www.cdc.gov<http://www.cdc.gov/>. 248 IN CNAME www.akam.cdc.gov<http://www.akam.cdc.gov/>. www.cdc.gov<http://www.cdc.gov/>. 248 IN RRSIG CNAME 8 3 300 20241019153420 20241009150230 1503 cdc.gov<http://cdc.gov/>. b99UIGmCOTJj+C7JFXORmtUXQEIIGdF0q3Z5u6HfAbKcJhjfFjJrkRE6 yntzr0pSksCp1Uwi146xvKz7ImCqkYK67/WlOujyquOGSfgOwO1DvUyj TfvXJWvjSRLTx30lwU6RV80RrC596A16anTpLc7Zi4VEAVncRHeUl1y1 /MG/CSCtE/Ef6tPD1FtGZjhXszVAgrk3fhISCsImRHuGAoIBnIKCKx2M YMhxirfV0z9Qq46PnW9zTzh+EbVKZkN0C+Xl3j2+4sqyHlubhrtgklG/ g0u+99/g/jdfex+Vh7dtcAXFcTZ1XGuPQXgsn6GrznecB8PaXmCxXfft GaDOdQ== www.akam.cdc.gov<http://www.akam.cdc.gov/>. 20 IN A 23.51.224.222 www.akam.cdc.gov<http://www.akam.cdc.gov/>. 20 IN RRSIG A 10 4 20 20241018102927 20241015092927 16701 akam.cdc.gov<http://akam.cdc.gov/>. Lcd7WthqqU+A7UwQkBHZsT0nqxztJkn9cx57wXr4eHHCvJR0cCxZFkwl eIbSffPIu364terXJlcEvuWbWTLrCX7bo0c6B9bA5EPi2DsbegTfkG5u cqrZP9RTzXbfbs5l5w6CQ9DfSPcYx9BIYkusErQu5qQnGhoQ5bXI1VxT Otc= The relevant portion of my named configuration is: tls opendns-tls { remote-hostname "dns.opendns.com<http://dns.opendns.com/>"; }; tls cloudflare_family-tls { remote-hostname "one.one.one.one"; }; tls google-tls { }; tls router1-tls { key-file "/var/cache/bind/privkey.pem"; cert-file "/var/cache/bind/fullchain.pem"; dhparam-file "/var/cache/bind/dhparam.pem"; ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; prefer-server-ciphers yes; session-tickets no; }; options { directory "/var/cache/bind"; recursion yes; allow-query { trusted_nets; }; version "none"; forwarders { # 1.1.1.3 port 853 tls cloudflare_family-tls; # 1.0.0.3 port 853 tls cloudflare_family-tls; 208.67.222.123 port 853 tls opendns-tls; 208.67.220.123 port 853 tls opendns-tls; # 8.8.8.8 port 853 tls google-tls; # 8.8.4.4 port 853 tls google-tls; }; forward only; allow-transfer { none; }; dnssec-validation auto; listen-on port 443 tls router1-tls http default { trusted_interfaces; }; listen-on port 853 tls router1-tls { trusted_interfaces; }; listen-on { trusted_interfaces; }; listen-on-v6 { none; }; zone-statistics yes ; }; -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org<mailto:bind-users@lists.isc.org> https://lists.isc.org/mailman/listinfo/bind-users
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users