This issue is rather puzzling; I have two ideas that might be relevant.
It seems that the failures occur when first querying for the domain (or perhaps when the cached answer has expired for some reason), and following requests are answered (successfully) and presumably, from cache. I wonder how long it takes for these nameservers to send a response (possibly for any part of the lookup process, including the A/AAAA records for the nameservers themselves). Any response times that exceed 1 second could potentially cause failures for Google Public DNS, which tries very hard to respond within a 2 second deadline for the original client request, and will return SERVFAIL if unable to complete the entire lookup within that time.
Another, and possibly related, idea was that I noticed that one of the nameservers (
v1.pcextreme.nl) is actually in its own quasi-delegated subdomain, which is not secured with DNSSEC:
The presence of NS records (and SOA) for the
v1.pcextreme.nl domain creates a delegation, even though the nameserver set is identical; the lack of a DS record for
v1.pcextreme.nl (even though there are DNSKEY records for
v1.pcextreme.nl) means that the
v1.pcextreme.nl zone is
not protected by DNSSEC.
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1024
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16376
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1024
;; ANSWER SECTION:
I wonder whether removing the NS and SOA records for
v1.pcextreme.nl. (or alternately, removing
v1.pcextreme.nl from the NS data for
e-golf4u.nl) might eliminate a "peculiarity" (not technically an error, but generally not considered best practice) that could be causing DNSSEC problems.
I would also suggest, that if the separate "self-delegation" of
v1.pcextreme.nl has some technical basis or justification, that the PC Extreme domain administrators at least create a DS record so that it gets DNSSEC protection as well; I suspect that increasing the TTL of NS and A/AAAA records for
v1.pcextreme.nl might also improve (if not push all the way to zero) the error rates you are seeing.
@alex