I highly recommend the following checker: https://zonemaster.se/en/run-test

On Mon, Nov 4, 2024, 3:25 PM Julian Panke via bind-users <
bind-users@lists.isc.org> wrote:

> Maybe https://dnsviz.net/ ?
>
> Mit freundlichen Grüßen
>
> Julian Panke
>
> -------- Ursprüngliche Nachricht --------
> Am 04.11.24 12:58 um Robert Wagner schrieb :
> Any chance someone from the bind group knows of an open-source DNS
> compliance validation tool that can analyze and check configuration
> settings?
> I hate to say it, but there are a lot of people managing DNS servers as
> part of other responsibilities. If it responds with an IP, then they
> consider it working/functional and nothing needs to be done. Having a tool
> that reviews your configuration and points out issues would help us
> advocate for proper configuration.  Kind of a SSL checker for DNS...
>
> Thanks in advance for any thoughts you can provide.
>
> Robert Wagner
> From: bind-users <bind-users-boun...@lists.isc.org> on behalf of Robert
> Edmonds <edmo...@mycre.ws>
> Sent: Friday, November 1, 2024 4:16 PM
> To: Robert Mankowski <robert.mankow...@hotmail.com>
> Cc: bind-users@lists.isc.org <bind-users@lists.isc.org>
> Subject: Re: DNSSEC, OpenDNS and www.cdc.gov
>
> This email originated from outside of TESLA
>
> Do not click links or open attachments unless you recognize the sender and
> know the content is safe.
>
> This is a problem with the operational configuration of the cdc.gov
> nameservers.
>
> The gov nameservers publish the following NS records for cdc.gov:
>
> cdc.gov.                10800   IN      NS      auth00.ns.uu.net.
> cdc.gov.                10800   IN      NS      auth100.ns.uu.net.
> cdc.gov.                10800   IN      NS      ns1.cdc.gov.
> cdc.gov.                10800   IN      NS      ns2.cdc.gov.
> cdc.gov.                10800   IN      NS      ns3.cdc.gov.
>
> The cdc.gov nameservers publish the following NS records for cdc.gov:
>
> cdc.gov.                3600    IN      NS      ns1.cdc.gov.
> cdc.gov.                3600    IN      NS      ns2.cdc.gov.
> cdc.gov.                3600    IN      NS      ns3.cdc.gov.
>
> This NS RRset from the cdc.gov nameservers (the NS RRset directly above
> which has three .cdc.gov NS records) is the authoritative NS RRset for
> cdc.gov and is used by standards conforming resolver implementation in
> preference to the non-authoritative NS RRset in the referral response
> from the .gov nameservers (the NS RRset at the top of this email with
> five NS records). See RFC 2181, section 5.4.1.
>
> The domain name www.cdc.gov is a CNAME to www.akam.cdc.gov:
>
> www.cdc.gov.            300     IN      CNAME   www.akam.cdc.gov.
>
> The ".cdc.gov" nameservers all generate RCODE "REFUSED" answers for
> queries for www.akam.cdc.gov (as well as akam.cdc.gov):
>
>     ; <<>> DiG 9.20.2-1-Debian <<>> +norec @ns1.cdc.gov www.akam.cdc.gov
>     ; (1 server found)
>     ;; global options: +cmd
>     ;; Got answer:
>     ;; ->>HEADER<<- opcode: QUERY, status: REFUSED, id: 27267
>     ;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
>
>     ;; OPT PSEUDOSECTION:
>     ; EDNS: version: 0, flags:; udp: 1232
>     ;; QUESTION SECTION:
>     ;www.akam.cdc.gov.              IN      A
>
>     ;; Query time: 4 msec
>     ;; SERVER: 198.246.96.61#53(ns1.cdc.gov) (UDP)
>     ;; WHEN: Fri Nov 01 15:40:44 EDT 2024
>     ;; MSG SIZE  rcvd: 45
>
> This is a standards conformance problem with the .cdc.gov nameservers.
> The .cdc.gov nameservers should either return a response containing
> records that answer the query, or a referral response to the nameservers
> that do. See RFC 1034, section 4.3.2(3)(b).
>
> The reason that some DNS resolver services are able to resolve this
> name is because they are probably also querying the .uu.net nameservers
> included in the delegation NS RRset for cdc.gov, and those nameservers
> are able to return a delegation for the akam.cdc.gov zone:
>
>     ; <<>> DiG 9.20.2-1-Debian <<>> +norec @auth00.ns.uu.net
> www.akam.cdc.gov
>     ; (1 server found)
>     ;; global options: +cmd
>     ;; Got answer:
>     ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51056
>     ;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 6, ADDITIONAL: 1
>
>     ;; OPT PSEUDOSECTION:
>     ; EDNS: version: 0, flags:; udp: 1232
>     ; NSID: 56 65 72 69 7a 6f 6e ("Verizon")
>     ;; QUESTION SECTION:
>     ;www.akam.cdc.gov.              IN      A
>
>     ;; AUTHORITY SECTION:
>     akam.cdc.gov.           86400   IN      NS      a1-43.akam.net.
>     akam.cdc.gov.           86400   IN      NS      a5-66.akam.net.
>     akam.cdc.gov.           86400   IN      NS      a2-64.akam.net.
>     akam.cdc.gov.           86400   IN      NS      a8-67.akam.net.
>     akam.cdc.gov.           86400   IN      NS      a9-64.akam.net.
>     akam.cdc.gov.           86400   IN      NS      a28-65.akam.net.
>
>     ;; Query time: 16 msec
>     ;; SERVER: 198.6.1.65#53(auth00.ns.uu.net) (UDP)
>     ;; WHEN: Fri Nov 01 15:44:13 EDT 2024
>     ;; MSG SIZE  rcvd: 185
>
> To be clear, though, this is unambiguously a problem with the cdc.gov
> nameservers and not a fault in resolver implementations that utilize the
> authoritative NS RRset for cdc.gov which does not include the .uu.net
> nameservers.
>
> Various issues with the operation of the cdc.gov zone have been reported
> to DNS-OARC's dns-operations mailing list over the years (as well as
> other forums). The most recent thread is archived here:
>
> https://lists.dns-oarc.net/pipermail/dns-operations/2024-July/022642.html
>
> Robert Mankowski wrote:
> > I recently implemented a forward only BIND server for home. I was
> forwarding to
> > OpenDNS FamilyShield using TLS and DNSSEC at first, but I was getting a
> > noticeable amount of SERVFAIL responses. I believe it is related to
> DNSSEC (see
> > delv tests below), but I don’t believe it is my configuration because
> when I
> > forward to Cloudflare’s Family service, or to Google DNS, I don’t have
> any
> > problems with the same domains (e.g. www.cdc.gov).
> >
> >
> >
> > I contacted Cisco Umbrella support because I was thinking it’s an issue
> with
> > their servers, but they didn’t really help, so I thought I would try
> this list
> > for advice.
> >
> >
> >
> > Would appreciate it if someone could review my configuration and/or
> reproduce
> > my results to see if I’m doing something wrong.
> >
> >
> >
> > Thanks,
> >
> >
> >
> > Bob
> >
> >
> >
> > Here are some tests I ran:
> >
> >
> >
> > admin@router1:~$ apt-cache policy bind9
> >
> > bind9:
> >
> >   Installed: 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7
> >
> >   Candidate: 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7
> >
> >   Version table:
> >
> > *** 1:9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7 500
> >
> >         500 https://packages.sury.org/bind-dev bookworm/main amd64
> Packages
> >
> >         100 /var/lib/dpkg/status
> >
> >      1:9.18.28-1~deb12u2 500
> >
> >         500 http://deb.debian.org/debian bookworm/main amd64 Packages
> >
> >         500 http://security.debian.org/debian-security
> bookworm-security/main
> > amd64 Packages
> >
> >
> >
> >
> >
> > admin@router1:~$ delv -v
> >
> > delv 9.21.1-1+0~20240920.124+debian12~1.gbp62e0e7-Debian
> >
> >
> >
> > admin@router1:~$ delv -4 @208.67.220.123 www.cdc.gov. A
> >
> > ;; insecurity proof failed resolving 'cdc.gov/DNSKEY/IN':
> 208.67.220.123#53
> >
> > ;; broken trust chain resolving 'www.cdc.gov/A/IN': 208.67.220.123#53
> >
> > ;; resolution failed: broken trust chain
> >
> >
> >
> > admin@router1:~$ delv -4 @208.67.222.123 www.cdc.gov. A
> >
> > ;; insecurity proof failed resolving 'cdc.gov/DNSKEY/IN':
> 208.67.222.123#53
> >
> > ;; broken trust chain resolving 'www.cdc.gov/A/IN': 208.67.222.123#53
> >
> > ;; resolution failed: broken trust chain
> >
> >
> >
> > admin@router1:~$ delv -4 @1.1.1.3 www.cdc.gov. A
> >
> > ; fully validated
> >
> > www.cdc.gov.            248     IN      CNAME   www.akam.cdc.gov.
> >
> > www.cdc.gov.            248     IN      RRSIG   CNAME 8 3 300
> 20241019153420
> > 20241009150230 1503 cdc.gov.
> > b99UIGmCOTJj+C7JFXORmtUXQEIIGdF0q3Z5u6HfAbKcJhjfFjJrkRE6
> > yntzr0pSksCp1Uwi146xvKz7ImCqkYK67/WlOujyquOGSfgOwO1DvUyj
> > TfvXJWvjSRLTx30lwU6RV80RrC596A16anTpLc7Zi4VEAVncRHeUl1y1 /MG/CSCtE/
> > Ef6tPD1FtGZjhXszVAgrk3fhISCsImRHuGAoIBnIKCKx2M
> > YMhxirfV0z9Qq46PnW9zTzh+EbVKZkN0C+Xl3j2+4sqyHlubhrtgklG/ g0u+99/g/
> > jdfex+Vh7dtcAXFcTZ1XGuPQXgsn6GrznecB8PaXmCxXfft GaDOdQ==
> >
> > www.akam.cdc.gov.       20      IN      A       23.51.224.222
> >
> > www.akam.cdc.gov.       20      IN      RRSIG   A 10 4 20
> 20241018102927
> > 20241015092927 16701 akam.cdc.gov.
> > Lcd7WthqqU+A7UwQkBHZsT0nqxztJkn9cx57wXr4eHHCvJR0cCxZFkwl
> > eIbSffPIu364terXJlcEvuWbWTLrCX7bo0c6B9bA5EPi2DsbegTfkG5u
> > cqrZP9RTzXbfbs5l5w6CQ9DfSPcYx9BIYkusErQu5qQnGhoQ5bXI1VxT Otc=
> >
> >
> >
> > The relevant portion of my named configuration is:
> >
> >
> >
> > tls opendns-tls {
> >
> >     remote-hostname "dns.opendns.com";
> >
> > };
> >
> >
> >
> > tls cloudflare_family-tls {
> >
> >     remote-hostname "one.one.one.one";
> >
> > };
> >
> >
> >
> > tls google-tls {
> >
> > };
> >
> >
> >
> > tls router1-tls {
> >
> >     key-file "/var/cache/bind/privkey.pem";
> >
> >     cert-file "/var/cache/bind/fullchain.pem";
> >
> >     dhparam-file "/var/cache/bind/dhparam.pem";
> >
> >     ciphers
> "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!
> > SHA1:!SHA256:!SHA384";
> >
> >     prefer-server-ciphers yes;
> >
> >     session-tickets no;
> >
> > };
> >
> >
> >
> > options {
> >
> >     directory "/var/cache/bind";
> >
> >     recursion yes;
> >
> >     allow-query { trusted_nets; };
> >
> >     version "none";
> >
> >
> >
> >     forwarders {
> >
> > #        1.1.1.3 port 853 tls cloudflare_family-tls;
> >
> > #        1.0.0.3 port 853 tls cloudflare_family-tls;
> >
> >         208.67.222.123 port 853 tls opendns-tls;
> >
> >         208.67.220.123 port 853 tls opendns-tls;
> >
> > #       8.8.8.8 port 853 tls google-tls;
> >
> > #       8.8.4.4 port 853 tls google-tls;
> >
> >     };
> >
> >
> >
> >     forward only;
> >
> >
> >
> >     allow-transfer { none; };
> >
> >
> >
> >     dnssec-validation auto;
> >
> >
> >
> >     listen-on port 443 tls router1-tls http default {
> trusted_interfaces; };
> >
> >     listen-on port 853 tls router1-tls { trusted_interfaces; };
> >
> >     listen-on { trusted_interfaces; };
> >
> >     listen-on-v6 { none; };
> >
> >
> >
> >     zone-statistics yes ;
> >
> > };
> >
> >
> >
> >
> >
>
> > --
> > Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
> >
> > ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
> >
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
>
> --
> Robert Edmonds
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
> --
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
> from this list
>
> ISC funds the development of this software with paid support
> subscriptions. Contact us at https://www.isc.org/contact/ for more
> information.
>
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to