I'm having issues trying to resolve www.sondait.tasker.com.br. The result from dig +trace is as follows:
# dig www.sondait.tasker.com.br +trace
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> www.sondait.tasker.com.br +trace
;; global options: +cmd
. 516836 IN NS c.root-servers.net.
. 516836 IN NS a.root-servers.net.
. 516836 IN NS f.root-servers.net.
. 516836 IN NS i.root-servers.net.
. 516836 IN NS j.root-servers.net.
. 516836 IN NS b.root-servers.net.
. 516836 IN NS h.root-servers.net.
. 516836 IN NS k.root-servers.net.
. 516836 IN NS m.root-servers.net.
. 516836 IN NS l.root-servers.net.
. 516836 IN NS d.root-servers.net.
. 516836 IN NS e.root-servers.net.
. 516836 IN NS g.root-servers.net.
;; Received 512 bytes from 172.31.1.254#53(172.31.1.254) in 13 ms
br. 172800 IN NS a.dns.br.
br. 172800 IN NS b.dns.br.
br. 172800 IN NS c.dns.br.
br. 172800 IN NS d.dns.br.
br. 172800 IN NS e.dns.br.
br. 172800 IN NS f.dns.br.
;; Received 323 bytes from 192.203.230.10#53(192.203.230.10) in 139 ms
tasker.com.br. 86400 IN NS ns1.locaweb.com.br.
tasker.com.br. 86400 IN NS ns2.locaweb.com.br.
tasker.com.br. 86400 IN NS ns3.locaweb.com.br.
;; Received 153 bytes from 200.160.0.10#53(200.160.0.10) in 34 ms
;; Warning: Message parser reports malformed message packet.
;; Truncated, retrying in TCP mode.
;; Connection to 201.76.40.2#53(201.76.40.2) for www.sondait.tasker.com.br failed: connection refused.
;; Connection to 187.45.246.2#53(187.45.246.2) for www.sondait.tasker.com.br failed: connection refused.
;; Connection to 189.126.108.2#53(189.126.108.2) for www.sondait.tasker.com.br failed: connection refused.
I don't know where to start to solve this issue. Using my Internet provider's DNS I got a positive answer.
Could you please help me solve this issue?
Thanks in advance.
I'm gonna try to contact the domain owners as well, but I noticed my enterprise DNS can get a correct answer for that domain. Is there any way I can force different response from localweb servers until I got this permanently fixed? Like force UDP packet sizes or disable EDNS for that domain? Could you also, please, share the tcpdump line you used to get that package details?
Regards
----------------------------------------
> To: flg...@hotmail.com
> CC: bind-...@isc.org
> CC: postm...@locaweb.com.br
> From: ma...@isc.org
> Subject: Re: Message parser reports malformed message packet
> Date: Tue, 5 Nov 2013 08:09:05 +1100
> ;; Warning: Message parser reports malformed message packet.
>
> ; <<>> DiG 9.10.0a1 <<>> www.sondait.tasker.com.br @201.76.40.2 +nodnssec +noedns +ignore +besteffort +all +norec
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58468
> ;; flags: qr aa tc; QUERY: 1, ANSWER: 1, AUTHORITY: 13, ADDITIONAL: 13
> ;; WARNING: Message has 6 extra bytes at end
>
> ;; QUESTION SECTION:
> ;www.sondait.tasker.com.br. IN A
>
> ;; ANSWER SECTION:
> www.sondait.tasker.com.br. 3600 IN CNAME trial-1910070769.sa-east-1.elb.amazonaws.com.
>
> ;; AUTHORITY SECTION:
> . 518400 IN NS a.root-servers.net.
> . 518400 IN NS b.root-servers.net.
> . 518400 IN NS c.root-servers.net.
> . 518400 IN NS d.root-servers.net.
> . 518400 IN NS e.root-servers.net.
> . 518400 IN NS f.root-servers.net.
> . 518400 IN NS g.root-servers.net.
> . 518400 IN NS h.root-servers.net.
> . 518400 IN NS i.root-servers.net.
> . 518400 IN NS j.root-servers.net.
> . 518400 IN NS k.root-servers.net.
> . 518400 IN NS l.root-servers.net.
> . 518400 IN NS m.root-servers.net.
>
> ;; ADDITIONAL SECTION:
> a.root-servers.net. 3600000 IN A 198.41.0.4
> b.root-servers.net. 3600000 IN A 192.228.79.201
> c.root-servers.net. 3600000 IN A 192.33.4.12
> d.root-servers.net. 3600000 IN A 128.8.10.90
> e.root-servers.net. 3600000 IN A 192.203.230.10
> f.root-servers.net. 3600000 IN A 192.5.5.241
> g.root-servers.net. 3600000 IN A 192.112.36.4
> h.root-servers.net. 3600000 IN A 128.63.2.53
> i.root-servers.net. 3600000 IN A 192.36.148.17
> j.root-servers.net. 3600000 IN A 192.58.128.30
> k.root-servers.net. 3600000 IN A 193.0.14.129
> l.root-servers.net. 3600000 IN A 198.32.64.12
>
> ;; Query time: 368 msec
> ;; SERVER: 201.76.40.2#53(201.76.40.2)
> ;; WHEN: Tue Nov 05 07:56:01 EST 2013
> ;; MSG SIZE rcvd: 512
>
> In message <BLU172-W48A5D0159...@phx.gbl>, =?iso-8859-1?B?RuFiaW
> 8gR29tZXM=?= writes:
>> Hi,
>>
>> I'm having issues trying to resolve www.sondait.tasker.com.br. The
>> result from dig +trace is as follows:
>>
>>
>>
>> tasker.com.br. 86400 IN NS ns1.locaweb.com.br.
>> tasker.com.br. 86400 IN NS ns2.locaweb.com.br.
>> tasker.com.br. 86400 IN NS ns3.locaweb.com.br.
>> ;; Received 153 bytes from 200.160.0.10#53(200.160.0.10) in 34 ms
>>
>> ;; Warning: Message parser reports malformed message packet.
>> ;; Truncated, retrying in TCP mode.
>> ;; Connection to 201.76.40.2#53(201.76.40.2) for
>> www.sondait.tasker.com.br failed: connection refused.
>> ;; Connection to 187.45.246.2#53(187.45.246.2) for
>> www.sondait.tasker.com.br failed: connection refused.
>> ;; Connection to 189.126.108.2#53(189.126.108.2) for
>> www.sondait.tasker.com.br failed: connection refused.
>>
>>
>>>> ;; Warning: Message parser reports malformed message packet.
>>>> ;; Truncated, retrying in TCP mode.
>>>> ;; Connection to 201.76.40.2#53(201.76.40.2) for
>>>> www.sondait.tasker.com.br failed: connection refused.
Even if my firewalls are not allowing udp packages bigger than 512, the retry to port 53 should work. Right?
I'm trying to reach the my client's network team and check if their DNS servers are allowed to make outbound connections to port 53. Which seems it is not the case.
I'll reply to this thread once I contact the firewall's owner.
Thank you very much!
----------------------------------------
> To: flg...@hotmail.com
> CC: bind-...@isc.org
> From: ma...@isc.org
> Subject: Re: Message parser reports malformed message packet
> Date: Tue, 5 Nov 2013 23:33:39 +1100