Problem: Google's Public DNS returns NXDOMAIN for certain SLDs.Proof of problem:
----------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------
as you can see the query status is NXDOMAIN. Asking the authoritative DNS server listed in the AUTHORITY section, however, points to a correct answer:
----------------------------------------------------------------------------------------------------------------------------
dig vpn.vegashoster.com @ns1.vegashoster.com
; <<>> DiG 9.11.5-P4-5.1+deb10u8-Debian <<>> vpn.vegashoster.com @ns1.vegashoster.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37073
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 600
;; QUESTION SECTION:
;vpn.vegashoster.com. IN A
;; ANSWER SECTION:
vpn.vegashoster.com. 3600 IN A 208.67.1.122
;; Query time: 128 msec
;; SERVER: 198.23.54.133#53(198.23.54.133)
;; WHEN: Thu Feb 09 09:58:05 EET 2023
;; MSG SIZE rcvd: 64
----------------------------------------------------------------------------------------------------------------------------
The authoritative DNS server is consistent in the responses:
----------------------------------------------------------------------------------------------------------------------------
for i in $(seq 1 30)
do
if [[ -z "$query" ]]
then echo "NO ANSWER"
else
echo "ANSWER"
fi
sleep 2
done | sort | uniq -c
30 ANSWER
----------------------------------------------------------------------------------------------------------------------------
I tried the following in two different tabs:
----------------------------------------------------------------------------------------------------------------------------
TAB2 server side // tcpdump -vvvvv -w /tmp/dns.pcap udp and port 53
TAB2 server side // tcpdump -n -t -r /tmp/dns.pcap | grep vpn
----------------------------------------------------------------------------------------------------------------------------
found none. How can I further debug this? Thanks for any forthcoming suggestions!