[EXTERNAL] Re: [dns-operations] is anybody awake at 5.0.1.0.0.2.ip6.arpa? (comcast and/or arin)
Feldman, Mark
Mark_Feldman at comcast.com
Tue Oct 6 13:32:20 UTC 2020
We are awake now. With some coffee and some consultation with our vendor, we have corrected the signing issue on 9.5.5.0.1.0.0.2.ip6.arpa. Now to make sure this doesn't happen again...
Mark
Comcast DNS
On 10/6/20, 8:31 AM, "dns-operations on behalf of Mark Andrews" <dns-operations-bounces at dns-oarc.net on behalf of marka at isc.org> wrote:
> On 6 Oct 2020, at 23:14, Shumon Huque <shuque at gmail.com> wrote:
>
> On Mon, Oct 5, 2020 at 11:22 PM Mark Andrews <marka at isc.org> wrote:
> > On 6 Oct 2020, at 13:18, Paul Vixie <vixie at fsi.io> wrote:
> >
> > ssh gets hinky when i connect from a server whose PTR is "servfail" (dnssec "bogus")
> >
> > • 5.0.1.0.0.2.ip6.arpa to 9.5.5.0.1.0.0.2.ip6.arpa: No valid RRSIGs made by a key corresponding to a DS RR were found covering the DNSKEY RRset, resulting in no secure entry point (SEP) into the zone. (68.87.68.244, 68.87.72.244, 68.87.76.228, 68.87.85.132, 69.252.250.103, 2001:558:1004:7:68:87:85:132, 2001:558:100a:5:68:87:68:244, 2001:558:100e:5:68:87:72:244, 2001:558:1014:c:68:87:76:228, 2001:558:fe23:8:69:252:250:103, UDP_-_EDNS0_4096_D_K)
>
> I have no idea why DNSVIZ is reporting this NSEC record (?) given there is a DS RRset. The covering NSEC record for 9.5.5.0.1.0.0.2.ip6.arpa that would prove the non existence of the DS RRset if it didn’t exist is 9.5.5.0.1.0.0.2.ip6.arpa. I suspect a DNSVIZ bug here.
>
> Sorry Mark - where do you see dnsviz complaining about an NSEC record?
If it was a DS record I would expect the message to say 9.5.5.0.1.0.0.2.ip6.arpa (not 5.0.1.0.0.2.ip6.arpa to 9.5.5.0.1.0.0.2.ip6.arpa) which feels more like a NSEC than a DS. It’s not actually clear what RRset it is referring to.
> This error message says that no "valid" DNSKEY RRSIGs made by a key matching the DS RRset were found -- which is a correct diagnosis. No NSEC records are involved in that determination.
>
> As you've already pointed out, DNSKEY with keytag 47242 has an expired signature on the DNSKEY RRset. Key 30705 has a valid unexpired signature but that does not match the DS set (it also doesn't have the advisory SEP flag, so was likely not intended to be used as a secure entry point).
>
> Shumon.
>
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
_______________________________________________
dns-operations mailing list
dns-operations at lists.dns-oarc.net
https://urldefense.com/v3/__https://lists.dns-oarc.net/mailman/listinfo/dns-operations__;!!CQl3mcHX2A!VF4KVriouWi6zYNjZ2bOXwKJdynCmhnZREJvBPMF5wR09hofL_4rK-ElOUrm637F1gM$
More information about the dns-operations
mailing list