[dns-operations] .gov has been re-inserted into dlv.isc.org
Michael Sinatra
michael at rancid.berkeley.edu
Fri May 1 16:07:59 UTC 2009
On 05/01/09 05:03, Michael Graff wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> .gov has just been re-inserted into dlv.isc.org. Please report any
> problems to dlv-registry at isc.org.
I was getting SERVFAILs on most of my caching boxes after the key was
added. 'rndc flushname gov' effectively fixed that problem. The only
box that didn't have the problem was the least-busy one, so I assume
there were caching issues involved. In some cases, gov was resolvable
(although insecure) but subdomains in gov (e.g. nist.gov) were not. (In
the example below, gov itself was not resolvable.) After 'rndc
flushname gov', gov resolves with the ad bit set; nist.gov resolves but
is still insecure (doesn't appear to be a DS record in the parent). dig
output from one of the boxes is below.
dnssec.log on each box indicates problems resolving hosts in gov (mostly
time.nist.gov which presumably some hosts were using for ntp) beginning
around 0600 lt (1300 GMT), although one box started logging "no valid
signature" as early as 0542.
I suspect this was a caching issue where cached parent data was insecure
after the DLV key was inserted. The TTL on time.nist.gov (and
ns1.nist.gov, but not the other NS) is 1800, so when it expired from
cache, presumably there would have been resolution problems trying to
get authoritative delegation information from a parent zone (i.e. gov)
that was insecure in cache but should now have been secure owing to the
presence of a DLV record.
'rndc flush' is the recommended course of action when first enabling
validation or when adding keys to the local trust anchor repository
(usually done at the same time), so it may be the case that this is to
be expected (although certainly not desired) when keys are added to the
DLV for a zone that has a lot of delegations. The question is whether a
similar effect will occur in the presence of a signed root, when a DS
record is added to the root zone for a TLD (say, com).
RFC 4035 (and 4033-4) are quiet about this kind of situation; RFC 4641,
section 4.2 discusses cached data in the context of key rollovers, but I
can't find reference to the specific example of when a trust anchor or
some sort of delegation key (DS or DLV) is added for a particular zone
and old (insecure) information about that zone is cached.
michael
drl2# dig +dnssec gov @drl2
; <<>> DiG 9.6.0-P1 <<>> +dnssec gov @drl2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 61532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;gov. IN A
;; Query time: 529 msec
;; SERVER: 2607:f140:ffff:8000:0:8001:0:2#53(2607:f140:ffff:8000:0:8001:0:2)
;; WHEN: Fri May 1 08:16:55 2009
;; MSG SIZE rcvd: 32
drl2# dig +dnssec nist.gov @drl2
; <<>> DiG 9.6.0-P1 <<>> +dnssec nist.gov @drl2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 22273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;nist.gov. IN A
;; Query time: 1375 msec
;; SERVER: 169.229.128.150#53(169.229.128.150)
;; WHEN: Fri May 1 08:17:20 2009
;; MSG SIZE rcvd: 37
drl2# rndc flushname gov
drl2# dig +dnssec nist.gov @drl2
; <<>> DiG 9.6.0-P1 <<>> +dnssec nist.gov @drl2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16576
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 3, ADDITIONAL: 3
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;nist.gov. IN A
;; ANSWER SECTION:
nist.gov. 1800 IN A 129.6.13.45
nist.gov. 1800 IN RRSIG A 5 2 1800
20090530183420 20090430183420 63462 nist.gov.
oTVsdWbx7gkhP9NgLLoRybgk3ejK98jnlwAn2NF5vSqGn5+Ey1cVvJip
Btw1n3i2XtitBYR8LfqDfnCCg1Hz2K9ZCWsEz96eErzFaN21SV8gz7TT
+DiBDlPe4N03lvkaYzQsPG+3cs5FfvlSM8x6ePQUneG42JfKVdQCAeqB hF8=
;; AUTHORITY SECTION:
nist.gov. 65026 IN NS ns1.nist.gov.
nist.gov. 65026 IN NS dns-x.boulder.nist.gov.
nist.gov. 65026 IN RRSIG NS 5 2 86400
20090530183420 20090430183420 63462 nist.gov.
YDx7OPeuomVV2v0qQXUKSQGm9fpCsa/M5aRZ8ZDnLhlEqWi0kTb9RuuO
VrLSbZ+deFL8dmfQnYrYb3WnP99DU4JALW2Rbb9oPAcUyMZehgQQEu5O
9/jCOxcG15ysgdAaP5bhegEJOXSS37OCcvNrGOWA2pAGfnn3Ri6MRVJP 810=
;; ADDITIONAL SECTION:
dns-x.boulder.nist.gov. 76136 IN A 132.163.4.9
dns-x.boulder.nist.gov. 76136 IN RRSIG A 5 4 86400
20090201120000 20080318211639 61107 boulder.nist.gov.
pfp8EHFPL4B6QYTkZD8lqFjLnYR7G53B/tvYiMYCPhkVBwFbaKoCGXkL
Xe7W7GW0lQ5kv6Sm35YFsWF88KvealGS9p4sr+kg+4hH+VyQuCKipGur
LM7LER/8WVW2pCWBpwtW2Miw4G2noM/J0VPxzCO3KhJR2f6qddu074g+ wJE=
;; Query time: 120 msec
;; SERVER: 2607:f140:ffff:8000:0:8001:0:2#53(2607:f140:ffff:8000:0:8001:0:2)
;; WHEN: Fri May 1 08:17:29 2009
;; MSG SIZE rcvd: 627
drl2# dig +dnssec gov @drl2
; <<>> DiG 9.6.0-P1 <<>> +dnssec gov @drl2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 24298
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;gov. IN A
;; AUTHORITY SECTION:
gov. 10800 IN SOA A.GOV.ZONEEDIT.COM.
govcontact.ZONEEDIT.COM. 1241186464 3600 900 1814400 86400
gov. 10800 IN RRSIG SOA 7 1 259200
20090506130105 20090501130105 31802 gov.
kAYdnSLxmRAhGrET+7oSjxmPJlrq7qkcWaocQvFlM6bS/owahmdFFQuR
PudqQWufP/hth0heCQy6a/IntxiNrzgAsGzszUfutzkxac8FseN+LMKO
sCqAkRbjzpO7o2s3A3DXp1TgeHM01AAU3K3nFYOAAm+WFmrAjK+Q++G5
CA38Wb7LoUrnkGVdAwqF9RWTt0MlswLTfzRQvnljTaCpMdX8ZnWCUS90
ngWRqTvfUVcRJTWln5N44ce64b93s0vjorNVwaZ5Ws+7K+O7aGOSeJ0N
SafNTc5COb9x2xXwmAyIULC37RnJ1+eoGG1ivyW4mMuR4KTdTQ+rElc4 SjHueQ==
VVSOMCNUB7A79EALVJEH4VN12192C715.gov. 10800 IN RRSIG NSEC3 7 2 86400
20090506130105 20090501130105 31802 gov.
c6PK6kDitsv9DvcFf4zC77WuXk7mo6dXax59MbakQqVk8EpbyP71WOMp
ZlJL0wmtQEVorUbYXg+GPspIgGJcM/obvJ3OVZlV7EOtvlmZbvYALENt
WXXc2FPXtcIYU7UGD2Qgz6OQOKKu4+SzCBEGVZ6NYxsU3nMO1mao0kWH
7gpClnUNB0e3rPVnRA7F107sI6xH+7nSrJNeXf0kr5/6FuVBFVxGZ0R1
Z/6T0wQGrDe2LFEt4l4oIL2KZlE6E/nNQY3Ar0GO9WRV+FLiu610drJv
M9ojF9YkBgQWX9tkd7mtXv10H6v+E9UFN+bjipMrDaxCcef871CyTOIA ZHo6rg==
VVSOMCNUB7A79EALVJEH4VN12192C715.gov. 10800 IN NSEC3 1 0 10 ABAB
0002H1U5Q5HGQCITMSB0QRETCK0N6FLT NS SOA RRSIG DNSKEY NSEC3PARAM
;; Query time: 86 msec
;; SERVER: 2607:f140:ffff:8000:0:8001:0:2#53(2607:f140:ffff:8000:0:8001:0:2)
;; WHEN: Fri May 1 08:17:34 2009
;; MSG SIZE rcvd: 761
More information about the dns-operations
mailing list