Hi Jason,
I think you already answered yourself in your blog post:
https://kevinlocke.name/bits/2017/01/20/formerr-from-microsoft-dns-server-for-dig/
> This behavior appears to violate “Any OPTION-CODE values not
understood by a responder or requestor MUST be ignored.” from Section
6.1.2 of RFC 6891, but that is of small consolation for a non-working
system.
So yes, the authoritative server most likely has a bug.
How to approach the operation in question - that's a hard problem. You
can either try various contacts you find, you can ask send name of the
domain here and ask them to contact you off-list. For TLDs this method
can work surprisingly well :-)
Good luck.
Petr Špaček
On 20. 09. 21 15:37, Jason Hynds wrote:
Hi,
I hope that the following conforms to the content expected of this list.
I stumbled on some /name servers/ (a branch of a ccTLD, performing a
public good service, as far as I know) which are giving a FORMat ERRor
(FORMERR) to default /dig/ queries from the command line as described in
the referenced webpage, see [1] below. The workaround of +nocookie
described in the blog allows for a successful query response. /Nslookup/
queries work fine.
I should mention that I have no administrative authority of the name
servers showing this condition. I'm just noticed the behaviour whilst
checking on a DNS hosting migration for a client of the name servers
exhibiting the behaviour.
Would someone be able to advise me on:
1. How bad it may be for an authoritative or delegating name server to
be exhibiting this behaviour?
2. Does this potentially cause a resolution outage, or would a BIND
server adjust and re-query in order to obtain a usable result?
3. Is the BIND server non-compliant, or the likely Microsoft DNS
non-compliant, to an RFC?
4. How would I explain such an issue to a name server operator who I do
not know?
I appreciate any guidance provided. I apologies in advance if I violated
any list policy. Thanks for any assistance.
*REFERENCE*
[1] FORMERR from Microsoft DNS Server for DIG. Posted January 20,
2017 at 11:18 PM MST by Kevin Locke
<https://kevinlocke.name/bits/2017/01/20/formerr-from-microsoft-dns-server-for-dig
<https://kevinlocke.name/bits/2017/01/20/formerr-from-microsoft-dns-server-for-dig>>.
Regards,
Jason Hynds.
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations