[dns-operations] At least 3 CloudFlare DNS-hosted domains with oddball TLSA lookup ServFail

Mark Andrews marka at isc.org
Thu May 28 01:47:57 UTC 2020



> On 28 May 2020, at 09:21, Andrew Tunnell-Jones via dns-operations <dns-operations at dns-oarc.net> wrote:
> 
> 
> From: Andrew Tunnell-Jones <andrew at tj.id.au>
> Subject: Re: [dns-operations] At least 3 CloudFlare DNS-hosted domains with oddball TLSA lookup ServFail
> Date: 28 May 2020 at 09:21:00 AEST
> To: Christian Elmerot <christian at elmerot.se>
> Cc: dns-operations at lists.dns-oarc.net
> 
> 
> On Thu, May 28, 2020 at 3:18 AM Christian Elmerot <christian at elmerot.se> wrote:
>> 
>> 
>> On 26/05/2020 12:00, Viktor Dukhovni wrote:
>>> On Thu, Apr 23, 2020 at 08:46:02AM -0400, Shumon Huque wrote:
>>> 
>>>>> Great, thanks.  Not yet resolved FWIW:
>>>>> 
>>>>>     http://dnssec-stats.ant.isi.edu/~viktor/dnsviz/cloudflare.com.html
>>>> I didn't see the reason for the SERVFAIL in the dnsviz output. So I ran
>>>> my own debugging tool on these domains. All the CF servers for the zone
>>>> are unresponsive to DNS queries for the TLSA record at those names. I
>>>> assume that's why we get SERVFAIL. They respond to other queries fine
>>>> such as apex SOA, A, etc):
>>> I've rescanned the three domains, still broken (same URL, updated
>>> content), and yes silence.
>>> 
>>>     @alla.ns.cloudflare.com.[173.245.58.62]
>>>     ; <<>> DiG 9.16.2 <<>> +noidnout +nosearch +dnssec +noall +cmd +comment +qu +ans +auth +nocl +nottl +nosplit +norecur -t tlsa _25._tcp.mx01.mx-hosting.ch @173.245.58.62
>>>     ;; connection timed out; no servers could be reached
>>> 
>>>     @guss.ns.cloudflare.com.[173.245.59.172]
>>>     ; <<>> DiG 9.16.2 <<>> +noidnout +nosearch +dnssec +noall +cmd +comment +qu +ans +auth +nocl +nottl +nosplit +norecur -t tlsa _25._tcp.mx01.mx-hosting.ch @173.245.59.172
>>>     ;; connection timed out; no servers could be reached
>>> 
>>> Unclear why the TLSA queries are dropped, and by whom (is Cloudflare
>>> just proxying breakage at the customer's DNS?)
>> 
>> I've looked into the error on our side and the reason for those
>> SERVFAILs are due to malformed record content. This is likely due to an
>> older version of our API not performing the correct validations for TLSA
>> records and it is unfortunate the zone owners never checked the output.
>> 
> 
> The web interface still allows creation of TLSA records with invalid
> data. As well a "Certificate" field containing whitespace and hex is
> accepted by the web interface but results in the same failure. This is
> likely to catch people out as whitespace is part of the presentation
> format of that field. The placeholder text for that field is also PEM
> rather than hex.

This is reminiscent of DS parsing stupidities by web tools.  DS also
allows whitespace in the hex encoding and the introduction of type 2
DS records exposed broken parsers.  We ended up modifying dnssec-dsfromkey
to omit the space just so the cut-and-paste didn’t include whitespace.

% dig dnskey . +noall +answer | dnssec-dsfromkey -f - .
. IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D
% 

Not that DNS is alone in the UX idiocy.  Lots of phone number parsers can’t
handle whitespace nor plus (+).  Similarly credit card number parsers.  The
number on credit cards are broken up to PREVENT user input errors and the UX
developers defeat that by force space less entry.


> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: marka at isc.org




More information about the dns-operations mailing list