dnssec not automatically updating on 1 server

2023-06-15 Thread Michael Martinell via bind-users
Anybody have any ideas on why my dnssec records don't always automatically 
update on my NS2 authoritative server?  On my NS1 authoritative server the 
records update without issue.
NS2 is an exact copy of NS1. We SCP all of the config files from the first 
server to the second server and do "rndc reconfig && rndc reload && systemctl 
restart bind" on both servers.
They are both Centos 7 running Bind 9.16.40.

When it fails, I get this message:
[root@ns2 ~]# delv itctel.com @ns2.itctel.com
;; validating itctel.com/A: verify failed due to bad signature (keyid=3593): 
RRSIG has expired
;; validating itctel.com/A: no valid signature found
;; RRSIG has expired resolving 'itctel.com/A/IN': 75.102.160.231#53
;; validating itctel.com/A: verify failed due to bad signature (keyid=3593): 
RRSIG has expired
;; validating itctel.com/A: no valid signature found
;; RRSIG has expired resolving 'itctel.com/A/IN': 
2607:d600:9000:300:75:102:160:231#53
;; resolution failed: RRSIG has expired


I have this policy in named.conf
dnssec-policy "itc-no-rotate" {
keys {
ksk key-directory lifetime unlimited algorithm 13;
zsk key-directory lifetime unlimited algorithm 13;
};
nsec3param;
};

I have this set up in a custom includes file:
zone "itctel.com" in {
type master;
file "forward/itctel.com.zone";
dnssec-policy itc-no-rotate;
inline-signing yes;
};

No changes to my actual zone files. The inline signing takes care of everything.

Here is a list of my files for this domain
/var/named/forward/itctel.com.zone  /var/named/forward/itctel.com.zone.jnl  
/var/named/forward/itctel.com.zone.signed
/var/named/forward/itctel.com.zone.jbk   /var/named/forward/itctel.com.zone.new 
 /var/named/forward/itctel.com.zone.signed.jnl




Michael Martinell
Network/Broadband Technician

Interstate Telecommunications Coop., Inc.
312 4th Street West * Clear Lake, SD 57226
Phone: (605) 874-8313
michael.martin...@itccoop.com
www.itc-web.com
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


9.18 BIND not iterated over all authoritative nameservers

2023-10-27 Thread Michael Martinell via bind-users
Hello,

At this point I am hoping that somebody might have a workaround so that we can 
exclude domains from this behavior if they are broken on the far end. Does 
anybody have a workaround for this?

We are a small ISP and run BIND compiled from source. We currently run 9.16.x
Every time we try to move forward with 9.18 customers start to complain that 
they are unable to reach certain websites.  This includes banks, universities, 
and other organizations.

I understand the goal is to get all DNS to RFC 6891, but from a practical 
standpoint, this isn't working for customers, so we are prevented from 
upgrading either.

Related website:
https://gitlab.isc.org/isc-projects/bind9/-/issues/3152

Our source code compile options:
./configure --with-gnu-ld --with-libxml2 --with-json-c 
--with-openssl=/usr/local/openssl && make && make install && ldconfig

When I do a dig against a server running 9.18 I get the following:

dig @dns1.itctel.com view.bankeasy.com

; <<>> DiG 9.16.42 <<>> @dns1.itctel.com view.bankeasy.com

; (2 servers found)

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 46906

;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 1232

; COOKIE: d8ce8161641fbfdf0100653bcf9ad1fff99d24914278 (good)

;; QUESTION SECTION:

;view.bankeasy.com. IN A

;; Query time: 8 msec

;; SERVER: 
2607:d600:1000:330:75:102:161:227#53(2607:d600:1000:330:75:102:161:227)

;; WHEN: Fri Oct 27 09:56:26 CDT 2023

;; MSG SIZE rcvd: 74


The same command resolves just fine when I run it against 9.16
dig @dns2.itctel.com view.bankeasy.com

; <<>> DiG 9.16.42 <<>> @dns2.itctel.com view.bankeasy.com

; (2 servers found)

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30969

;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 1232

; COOKIE: b0ec30c4ddfeacd30100653bcf9ff140c249344242e0 (good)

;; QUESTION SECTION:

;view.bankeasy.com. IN A

;; ANSWER SECTION:

view.bankeasy.com. 3133 IN CNAME view.gtm.bankeasy.com.

view.gtm.bankeasy.com. 300 IN A 96.2.250.200

;; Query time: 11 msec

;; SERVER: 
2607:d600:9000:330:75:102:160:227#53(2607:d600:9000:330:75:102:160:227)

;; WHEN: Fri Oct 27 09:56:31 CDT 2023

;; MSG SIZE rcvd: 125

[root@brkr-dns2 bind-9.18.12]#


Michael Martinell
Network/Broadband Technician

Interstate Telecommunications Coop., Inc.
312 4th Street West * Clear Lake, SD 57226
Phone: (605) 874-8313
michael.martin...@itccoop.com
www.itc-web.com
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: 9.18 BIND not iterated over all authoritative nameservers

2023-10-30 Thread Michael Martinell via bind-users
Thanks to all who responded. Putting qname-minimization disabled; in named.conf 
resolves the issue in my testing.

I did try specifying relaxed (which appears to be the default), but that didn’t 
work either.
I agree it would be great if the far ends would make sure what they publish is 
correct, but it will take a large company to push them to do so.



Michael Martinell
Network/Broadband Technician
Interstate Telecommunications Coop., Inc.
From: bind-users  On Behalf Of Paul Stead
Sent: Saturday, October 28, 2023 11:35 AM
Cc: bind-users@lists.isc.org
Subject: Re: 9.18 BIND not iterated over all authoritative nameservers

I wasn't

On Sat, Oct 28, 2023, 5:23 PM Ondřej Surý 
mailto:ond...@isc.org>> wrote:
Please don’t use Postel’s Law as excuse for implementations that break 
standards: 
https://datatracker.ietf.org/doc/html/rfc9413<https://datatracker.ietf.org/doc/html/rfc9413>
--
Ondřej Surý — ISC (He/Him)

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.


On 28. 10. 2023, at 17:50, Paul Stead 
mailto:paul.st...@gmail.com>> wrote:

As a previous ISP admin I too have come across similar situations and 
frustrations.

I can only say that Google and Cloudflare seem to follow Postel's Law moreso 
than BIND.

I agree this perpetuates bad practices but end users aren't interested in 
technical reasoning, especially when "it works everywhere else, you must be 
broken"

Paul

On Sat, Oct 28, 2023, 3:56 PM Rick Frey 
mailto:grib...@gmail.com>> wrote:
As Mark mentions, the NS records gtm.bankeasy.com<http://gtm.bankeasy.com> need 
to be corrected and failure is not due to lack of iterating through all auth 
nameservers (all of the auth nameservers have the bad NS record anyway).

Not sure how many other domains you are running into similar problem, but you 
could disable qname-minimization in 9.18 to mimic previous behavior of 9.16 if 
that number is large.  I believe qname-minimization is a global directive so it 
would remove privacy benefits of QNAME minimization for all recursive queries 
from your nameserver.

As DNS admin of another ISP, I sympathize dealing with failures caused by 
non-compliant authoritative nameservers.  These non-compliant auth nameservers 
can have little motivation to fix, especially when other large ISPs or public 
resolvers (looking at you Google and Cloudflare) don’t enforce DNS standards.   
Many non-compliant nameservers/records would be cleaned up if 
public/centralized DNS providers such as Google/Cloudflare would enforce since 
it would inflict those failures on a much larger user base.

 - Rick




On Oct 27, 2023, at 6:31 PM, Mark Andrews mailto:ma...@isc.org>> 
wrote:



Named now uses NS lookups to perform QNAME minimisation.  If one puts garbage 
in the NS
records then they should expect lookups to fail.  The NS records on both sides 
of a zone
cut are supposed to be IDENTICAL.  This is not a new requirement.  It has been 
this way
since the very beginning.

The bank needs to fix what they publish.

Mark


On 28 Oct 2023, at 02:36, Michael Martinell via bind-users 
mailto:bind-users@lists.isc.org>> wrote:

Hello,
At this point I am hoping that somebody might have a workaround so that we can 
exclude domains from this behavior if they are broken on the far end. Does 
anybody have a workaround for this?
We are a small ISP and run BIND compiled from source. We currently run 9.16.x
Every time we try to move forward with 9.18 customers start to complain that 
they are unable to reach certain websites.  This includes banks, universities, 
and other organizations.
I understand the goal is to get all DNS to RFC 6891, but from a practical 
standpoint, this isn’t working for customers, so we are prevented from 
upgrading either.
Related website:
https://gitlab.isc.org/isc-projects/bind9/-/issues/3152<https://gitlab.isc.org/isc-projects/bind9/-/issues/3152>
Our source code compile options:
./configure --with-gnu-ld --with-libxml2 --with-json-c 
--with-openssl=/usr/local/openssl && make && make install && ldconfig



Interstate Telecommunications Coop., Inc.
312 4th Street West • Clear Lake, SD 57226
Phone: (605) 874-8313
michael.martin...@itccoop.com<mailto:michael.martin...@itccoop.com>
www.itc-web.com<http://www.itc-web.com>


--
Visit 
https://lists.isc.org/mailman/listinfo/bind-users<https://lists.isc.org/mailman/listinfo/bind-users>
 to unsubscribe from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/<https://www.isc.org/contact/> for 
more information.


bind-users mailing list
bind-users@lists.isc.org<mailto:bind-users@lists.isc.org>
https://lists.isc.org/mailman/listinfo/bind-users<https://lists.isc.org/mailman/listinfo/bind-users>
--
Visit 
https://lists.isc.org/mailman/lis

dnnsec ipv6 reverse zone configuration

2024-10-30 Thread Michael Martinell via bind-users
Hello, hoping somebody might have some insight into the errors I am seeing on 
ipv6 dnssec records.

I am just starting to roll out dnssec on my reverse zones and have started with 
IPv6 on the record that contains just our ns2.itctel.com and dns2.itctel.com 
records. Our IPv4 forward zones are working fine and without error. This is our 
first reverse zone. I am currently using the same policy as the forward zone, 
but if necessary can create a separate policy for the reverse zone.

When I query 
https://dnssec-debugger.verisignlabs.com/3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa 
it looks like the 0.0.6.d.7.0.6.2.ip6.arpa section  is having issues with 
DNSKEY; however, the sections both above and below that section successfully 
returns green checkmarks.
Do I need to separate out all of the smaller sections below into their own 
zones? My full zone of 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa is successful, but 
the smaller portions are failing.
I get these successful messages:
Found 1 DS records for 0.0.6.d.7.0.6.2.ip6.arpa in the 
0.6.2.ip6.arpa zone
DS=3283/SHA-256 has algorithm ECDSAP256SHA256
Found 1 RRSIGs over DS RRset
RRSIG=42693 and DNSKEY=42693 verifies the DS RRset
Then I see errors at the dnssec-debugger: (in the 0.0.6.d.7.0.6.2.ip6.arpa 
section)
ns2.itctel.com returns REFUSED for 0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns1.itctel.com returns REFUSED for 0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
Failed to get DNSKEY RR set for zone 0.0.6.d.7.0.6.2.ip6.arpa
ns2.itctel.com returns REFUSED for 9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns1.itctel.com returns REFUSED for 9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns1.itctel.com returns REFUSED for 0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns2.itctel.com returns REFUSED for 0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns1.itctel.com returns REFUSED for 0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns2.itctel.com returns REFUSED for 0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns2.itctel.com returns REFUSED for 0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns1.itctel.com returns REFUSED for 0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns2.itctel.com returns REFUSED for 0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
ns1.itctel.com returns REFUSED for 0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
No DS records found for 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa in the 
0.0.6.d.7.0.6.2.ip6.arpa zone
Then the next section is a success again
Found 2 DNSKEY records for 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa
Found 1 RRSIGs over DNSKEY RRset


DIG successfully returns without error
dig +dnssec 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa DNSKEY @ns1.itctel.com

; <<>> DiG 9.11.9 <<>> +dnssec 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa DNSKEY 
@ns1.itctel.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33233
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 1232
; COOKIE: 256f2863771866840100671f8f58815467759394f32c (good)
;; QUESTION SECTION:
;3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa. IN DNSKEY

;; ANSWER SECTION:
3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa. 3600 IN DNSKEY 256 3 13 
BCg6PxA7axei2rIO9i7nKcmLR+atxJrNILLYOhxqQjJPHNgB66Llms9G 
VsHVouZNj2F9FN8r/1yqeGIPaTwwJA==
3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa. 3600 IN DNSKEY 257 3 13 
HuSoT3TZwpQphIZOauDjS72tSNZPLMWho9IhgB05xMiRgtTeMi87n+el 
2ZAKkwDMkPvdWMIWEdCp1Vh48CyhwQ==
3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa. 3600 IN RRSIG DNSKEY 13 16 3600 
20241107184719 20241024174719 14995 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa. 
0MCAIJnPjB/wvq47z7xcY5xejdNOGIRWFL+TYo+kqK1tU1DcUboUZc3b 
Bkyeaq5g64DiBgJzHwVZuDUtR/l24A==

;; Query time: 2 msec
;; SERVER: 75.102.161.234#53(75.102.161.234)
;; WHEN: Mon Oct 28 08:19:20 CDT 2024
;; MSG SIZE  rcvd: 385

I did register the DS record for this block of IPs that matches the zone with 
ARIN last week.

Network solutions still does not support  glue records for nameservers, so 
I am unable to add those.

My configuration is very simple and pretty much follows the bind documentation.

Running BIND 9.18.30

DNSSEC Policy
dnssec-policy "itc-no-rotate" {
keys {
ksk key-directory lifetime unlimited algorithm 13;
zsk key-directory lifetime unlimited algorithm 13;
};
nsec3param;
};


Zome record for this zone
zone "3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa" in {
type master;
file "reverse/2607.d600.9000.300.rev";
dnssec-policy itc-no-rotate;
inline-signing yes;
};

Any idea on what I need to do to resolve this issue?



Michael Martinell
Network/Broadband Technician

Interstate Telecommunications Coop., Inc.
312 4th Street West * Clear Lake, SD 57226
Phone: (605) 874-8313
michael.martin...@itccoop.com
www.itc-web.com
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contac

RE: dnnsec ipv6 reverse zone configuration

2024-11-01 Thread Michael Martinell via bind-users
Thanks!

This did the trick for me, once I built the missing zone and got the DS records 
in the correct spots everything is now reporting green.


Michael Martinell
Network/Broadband Technician
Interstate Telecommunications Coop., Inc.-Original Message-
From: Mark Andrews 
Sent: Wednesday, October 30, 2024 3:26 PM
To: Michael Martinell 
Cc: bind-users 
Subject: Re: dnnsec ipv6 reverse zone configuration

Create the zone 0.0.6.d.7.0.6.2.ip6.arpa and delegate 
3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa from it.
The ARIN servers delegate 0.0.6.d.7.0.6.2.ip6.arpa to ns1.itctel.com and 
ns2.itctel.com which are not configured to serve it or they have an overly 
restrictive ACL (it should be open to the world).

0.0.6.d.7.0.6.2.ip6.arpa. 86400 IN NS ns2.itctel.com.
0.0.6.d.7.0.6.2.ip6.arpa. 86400 IN NS ns1.itctel.com.
0.0.6.d.7.0.6.2.ip6.arpa. 86400 IN DS 3283 13 2 
2FA5DF2E9D49B5707921FEA0C1506988F0221E91E654D684149A2F47 4AD561ED 
0.0.6.d.7.0.6.2.ip6.arpa. 86400 IN RRSIG DS 8 10 86400 20241113152812 
20241030142812 42693 0.6.2.ip6.arpa. 
HmHen78HWXDa/8lSt1ju+ZXcIdfd3ChKjjb2z6Sxs8PYmUceEp//RndH 
AOfy6Arx88a3fypq83oh3/V1NhPwpvrByIgcYus+wESqe92ZRumAxDLb 
PscAOECw52MgOY/wWR/U4LOk7X34CuPZnxiSq1Y+3Rvjthl7gqb2UkFB 7y8= ;; Received 333 
bytes from 192.82.134.30#53(y.arin.net) in 228 ms

You will need to update the DS record for 0.0.6.d.7.0.6.2.ip6.arpa at ARIN if 
you need to recreate 0.0.6.d.7.0.6.2.ip6.arpa.

$ORIGIN 0.0.6.d.7.0.6.2.ip6.arpa.
@SOAns1.itctel.com. hostmaster.itctel.com. 2022012114 3600 3600 604800 3600
@NSns1.itctel.com.
@NSns2.itctel.com.
@DNSKEY…
@DNSKEY…
; securely delegate 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa
3.0.0.0.0.9NSns1.itctel.com.
3.0.0.0.0.9NSns2.itctel.com.
3.0.0.0.0.9DS14995 13 2 
A456A61C85301154FDE0A9465100810BACF91D08C91D7C5FAF3C813EB27638C9

With DNSSEC or QNAME minimisation you cannot miss intermediate zones.

Mark

> On 31 Oct 2024, at 00:31, Michael Martinell via bind-users 
>  wrote:
>
> Hello, hoping somebody might have some insight into the errors I am seeing on 
> ipv6 dnssec records.
>  I am just starting to roll out dnssec on my reverse zones and have started 
> with IPv6 on the record that contains just our ns2.itctel.com and 
> dns2.itctel.com records. Our IPv4 forward zones are working fine and without 
> error. This is our first reverse zone. I am currently using the same policy 
> as the forward zone, but if necessary can create a separate policy for the 
> reverse zone.
>  When I query 
> https://dnssec-debugger.verisignlabs.com/3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa 
> it looks like the 0.0.6.d.7.0.6.2.ip6.arpa section  is having issues with 
> DNSKEY; however, the sections both above and below that section successfully 
> returns green checkmarks.
> Do I need to separate out all of the smaller sections below into their own 
> zones? My full zone of 3.0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa is successful, 
> but the smaller portions are failing.
> I get these successful messages:
> Found 1 DS records for 0.0.6.d.7.0.6.2.ip6.arpa in the 
> 0.6.2.ip6.arpa zone
> DS=3283/SHA-256 has algorithm ECDSAP256SHA256
> Found 1 RRSIGs over DS RRset
> RRSIG=42693 and DNSKEY=42693 verifies the DS RRset
> Then I see errors at the dnssec-debugger: (in the
> 0.0.6.d.7.0.6.2.ip6.arpa section) ns2.itctel.com returns REFUSED for
> http://0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.6.d.7.0.6.2.ip6.arpa ns1.itctel.com returns REFUSED for
> http://0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.6.d.7.0.6.2.ip6.arpa Failed to get DNSKEY RR set for zone
> 0.0.6.d.7.0.6.2.ip6.arpa ns2.itctel.com returns REFUSED for
> http://9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=9.0.0.6.d.7.0.6.2.ip6.arpa ns1.itctel.com returns REFUSED for
> http://9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=9.0.0.6.d.7.0.6.2.ip6.arpa ns1.itctel.com returns REFUSED for
> http://0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.9.0.0.6.d.7.0.6.2.ip6.arpa ns2.itctel.com returns REFUSED for
> http://0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.9.0.0.6.d.7.0.6.2.ip6.arpa ns1.itctel.com returns REFUSED for
> http://0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.9.0.0.6.d.7.0.6.2.ip6.arpa ns2.itctel.com returns REFUSED for
> http://0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.9.0.0.6.d.7.0.6.2.ip6.arpa ns2.itctel.com returns REFUSED for
> http://0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa
> ns1.itctel.com returns REFUSED for
> http://0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa
> ns2.itctel.com returns REFUSED for
> http://0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa
> ns1.itctel.com returns REFUSED for
> http://0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa/DNSKEY
> n=0.0.0.0.9.0.0.6.d.7.0.6.2.ip6.arpa
> No DS records found for 3.0.0.0.0.9.0.0.