On 2022-08-17 09:37, Greg Ishimaru via Unbound-users wrote:
In one case, multiple zones were delegated to the
same set of authoritative name servers where the name servers were
configured to permanently timeout queries for one zone and respond
to queries for the other zones. It seems that the timeouts for the
zone configured to timeout caused unbound to stop providing answers
and respond with SERVFAIL for the other zones because all of the name
servers were in the blocking regime.
This is correct, unbound detected a server is not available and
therefore reduces the number of queries to the server to avoid
overloading it.
This behaviour solves the unfortunate problem that when you are a victim
of a real DDoS attack your legitimate traffic will often tend to retry
too such that without an exponential back-off in place or some other
mechanism to slow down and randomize the incoming requests, when the
DDoS ends the real backlogged requests will slam the server and
effectively extend the outage.
In another case, the authoritative
name servers would permanently timeout queries for non-existent records
in a zone and respond to queries for records that do exist in the
same zone.
Yup, they really need to fix their authoritative DNS, if they intend on
running authoritative DNS. Frankly, it sounds like maybe they don't have
the technical understanding to do so.