-- 
Mark Andrews

> On 9 May 2022, at 22:32, Veronique Lefebure <veronique.lefeb...@cern.ch> 
> wrote:
> 
> Second thought on this topic:
> 
> are the BIND EDNS messages rather related to
> 
> gr/DNSKEY (alg 8, id 13987): No response was received until the UDP payload 
> size was decreased, indicating that the server might be attempting to send a 
> payload that exceeds the path maximum transmission unit (PMTU) size. 
> (139.91.191.3, 2001:648:2c30::191:3, UDP_-_EDNS0_4096_D_KN)
> gr/DNSKEY (alg 8, id 45264): No response was received until the UDP payload 
> size was decreased, indicating that the server might be attempting to send a 
> payload that exceeds the path maximum transmission unit (PMTU) size. 
> (139.91.191.3, 2001:648:2c30::191:3, UDP_-_EDNS0_4096_D_KN)
> 
> as indicated by https://dnsviz.net/d/physics.uoi.gr/dnssec/ ?
> 
> I guess so.  
> 
> So with BIND 9.19 all queries using 139.91.191.3 will fail, but other NS will 
> answer successfully ?
> 
> 
>> On 09/05/2022 13:19 Veronique Lefebure <veronique.lefeb...@cern.ch> wrote:
>> 
>> 
>> Hello,
>> 
>> Now we are investigating another case:
>> 
>> On our internal DNS server we see :
>> 
>> 08-May-2022 20:48:14.248 edns-disabled: info: success resolving 
>> 'grid31.physics.uoi.gr/A' (in '.'?) after reducing the advertised EDNS UDP 
>> packet size to 512 octets
>> 08-May-2022 20:48:14.249 edns-disabled: info: success resolving 
>> 'grid31.physics.uoi.gr/AAAA' (in '.'?) after reducing the advertised EDNS 
>> UDP packet size to 512 octets
>> 
>> and on our external cache DNS server we see:
>> 
>> 03-May-2022 20:47:40.934 edns-disabled: info: success resolving 
>> 'grid31.physics.uoi.gr/AAAA' (in 'physics.uoi.gr'?) after disabling EDNS
>> 03-May-2022 20:47:40.937 edns-disabled: info: success resolving 
>> 'grid31.physics.uoi.gr/A' (in 'physics.uoi.gr'?) after disabling EDNS
>> 
>> Looking into our detailed logs, it seems to us that the root cause of the 
>> problem for this domain is that the DNS server used by physics.uoi.gr don't 
>> reply over ipv6, and that our DNS servers finally get an answer when they 
>> query the ipv4 NS.
>> 
>> This seems also to be confirmed by 
>> https://dnsviz.net/d/physics.uoi.gr/dnssec/ (really great tool !).
>> 
>> If the problem is simply ipv6, is it correct to say that the BIND messages 
>> above are misleading ?
>> Or is there really a EDNS-related issue ?
>> 
>> Thanks again,
>> Veronique
>> 
>> 
>>>> On 05/05/2022 03:01 Mark Andrews <ma...@isc.org> wrote:
>>> 
>>> 
>>>> On 5 May 2022, at 00:17, Veronique Lefebure <veronique.lefeb...@cern.ch> 
>>>> wrote:
>>>> 
>>>> Thanks Greg and Ondrej,
>>>> 
>>>> Many thanks for the pointer to DNS Cookies in BIND 9 (isc.org)
>>>> 
>>>> I have used https://ednscomp.isc.org/ednscomp/1ba42afa27 to check if  they 
>>>> are compliant, but the answer is ambiguous:
>>>> 
>>>> EDNS Compliance Tester
>>>> Checking: 'sour.woinsta.com' as at 2022-05-04T13:45:39Z
>>>> sour.woinsta.com.: NS lookup failed
>>>> Codes
>>>>    • ok - test passed.
>>> 
>>> Use the zone name ‘woinsta.com’.  The site asks for the zone name not an 
>>> arbitrary zone name.
>>> That said we make need to tweak the nameserver settings the tester is using 
>>> to get the initial
>>> NS lookup to succeed with broken servers like this.
>>> 
>>>> Anyway, from what you have seen you are suspecting that the problem is on 
>>>> the woinsta.com side and not on our side ?
>>>> 
>>>> The following indeed indicates a problem related to cookies:
>>>> 
>>>> dig @ns1.thednscloud.com. +nocookie sour.woinsta.com A +short 
>>>> 23.82.12.29 
>>>> 
>>>> while 
>>>> 
>>>> dig @ns1.thednscloud.com. +cookie sour.woinsta.com A +short
>>>> ; <<>> DiG 9.11.36 <<>> @ns1.thednscloud.com. +cookie sour.woinsta.com A 
>>>> +short 
>>>> ; (2 servers found) 
>>>> ;; global options: +cmd 
>>>> ;; connection timed out; no servers could be reached 
>>> 
>>> The servers will echo back a COOKIE option that has both the client and a 
>>> server cookie present.
>>> 
>>> % dig sour.woinsta.com ns @23.82.12.27 +norec 
>>> +cookie=44fd7abd853763e60100000062731621e76cd1b746056de3 +qr
>>> 
>>> ; <<>> DiG 9.17.22 <<>> sour.woinsta.com ns @23.82.12.27 +norec 
>>> +cookie=44fd7abd853763e60100000062731621e76cd1b746056de3 +qr
>>> ;; global options: +cmd
>>> ;; Sending:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2072
>>> ;; flags: ad; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 1232
>>> ; COOKIE: 44fd7abd853763e60100000062731621e76cd1b746056de3
>>> ;; QUESTION SECTION:
>>> ;sour.woinsta.com.        IN    NS
>>> 
>>> ;; QUERY SIZE: 73
>>> 
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2072
>>> ;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 1232
>>> ; COOKIE: 44fd7abd853763e60100000062731621e76cd1b746056de3 (good)
>>> ;; QUESTION SECTION:
>>> ;sour.woinsta.com.        IN    NS
>>> 
>>> ;; AUTHORITY SECTION:
>>> woinsta.com.        300    IN    SOA    ns1.emu-dns.com. admin.woinsta.com. 
>>> 2022020800 86400 10800 604800 300
>>> 
>>> ;; Query time: 236 msec
>>> ;; SERVER: 23.82.12.27#53(23.82.12.27) (UDP)
>>> ;; WHEN: Thu May 05 10:16:25 AEST 2022
>>> ;; MSG SIZE  rcvd: 127
>>> 
>>> % 
>>> 
>>> I suspect a stupid firewall in front of it that thinks it knows what is a 
>>> valid COOKIE option is
>>> but really it doesn’t.  The firewall then did the stupid thing of dropping 
>>> the request.  The correct
>>> protocol response to an invalid EDNS option is FORMERR with an OPT record 
>>> present if you understand
>>> EDNS.  If you don’t understand EDNS the correct response to EDNS is FORMERR 
>>> *without* an OPT record
>>> being present or just ignore the OPT record.
>>> 
>>> Too many servers don’t know how to construct a valid FORMERR response.  You 
>>> DO NOT just copy the
>>> request, set rcode to FORMERR and QR to 1 and send the resulting message.  
>>> Why would you send what
>>> you believe is garbage to the client?  The DNS message has a well defined 
>>> header which identifies
>>> the request / response.  Construct a valid response header based on the 
>>> header in the request and
>>> set the rcode to FORMERR.  Zero out the response header, copy the ID and 
>>> OPCODE fields.  Copy any
>>> header bits that you know are supposed to be copied.  Set the RCODE field 
>>> to FORMERR.  If it was
>>> a QUERY, and you understood the QUESTION section, you can copy that as well 
>>> updating the QUESTION
>>> count.
>>> 
>>> Basically there is a broken firewall and a broken DNS server here.  Both 
>>> need to be fixed.
>>> 
>>> Mark
>>> 
>>>> I will try send-cookie no for that server to confirm it is the source of 
>>>> the issue.
>>>> 
>>>> Cheers,
>>>> Veronique
>>>> 
>>>>> On 04/05/2022 14:34 Greg Choules <gregchoules+bindus...@googlemail.com> 
>>>>> wrote:
>>>>> 
>>>>> 
>>>>> Hi Veronique. 
>>>>> Every DNS server should support EDNS by now. It has been around for a 
>>>>> very long time. Even if it doesn't support EDNS it should ignore it.
>>>>> 
>>>>> I made some test queries and packet captures to 23.82.12.28. Whatever 
>>>>> this box is, please talk to the manufacturer about EDNS support. 
>>>>> Or.. it may be that some network infrastructure - firewalls are usually 
>>>>> the first place to look - is blocking this traffic.     
>>>>> 
>>>>> Whatever is happening at the authoritative end, it needs to be fixed. All 
>>>>> modern recursive servers will use EDNS.
>>>>> 
>>>>> Cheers, Greg
>>>> -- 
>>>> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
>>>> from this list
>>>> 
>>>> ISC funds the development of this software with paid support 
>>>> subscriptions. Contact us at https://www.isc.org/contact/ for more 
>>>> information.
>>>> 
>>>> 
>>>> bind-users mailing list
>>>> bind-users@lists.isc.org
>>>> https://lists.isc.org/mailman/listinfo/bind-users
>>> 
>>> -- 
>>> Mark Andrews, ISC
>>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>>> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to