; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.6 <<>> +additional anything.dodlive.mil. @8.8.4.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 58525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;anything.dodlive.mil. IN A
;; Query time: 51 msec
;; SERVER: 8.8.4.4#53(8.8.4.4)
;; WHEN: Tue Mar 15 18:08:34 2016
;; MSG SIZE rcvd: 38
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.6 <<>> +additional anything.dodlive.mil. @165.87.13.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52756
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;anything.dodlive.mil. IN A
;; ANSWER SECTION:
anything.DODLIVE.mil. 3195 IN CNAME www.dodlive.mil.edgekey.net.
www.dodlive.mil.edgekey.net. 239 IN CNAME e5757.dscb.akamaiedge.net.
e5757.dscb.akamaiedge.net. 20 IN A 23.7.177.136
;; Query time: 10 msec
;; SERVER: 165.87.13.129#53(165.87.13.129)
;; WHEN: Tue Mar 15 18:08:34 2016
;; MSG SIZE rcvd: 148
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.6 <<>> CNAME +additional anything.dodlive.mil. @8.8.4.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3421
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;anything.dodlive.mil. IN CNAME
;; ANSWER SECTION:
anything.dodlive.mil. 3599 IN CNAME www.dodlive.mil.edgekey.net.
;; Query time: 91 msec
;; SERVER: 8.8.4.4#53(8.8.4.4)
;; WHEN: Tue Mar 15 18:10:33 2016
;; MSG SIZE rcvd: 79
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.6 <<>> CNAME +additional anything.dodlive.mil. @165.87.13.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41648
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;anything.dodlive.mil. IN CNAME
;; ANSWER SECTION:
anything.DODLIVE.mil. 3076 IN CNAME www.dodlive.mil.edgekey.net.
;; Query time: 9 msec
;; SERVER: 165.87.13.129#53(165.87.13.129)
;; WHEN: Tue Mar 15 18:10:33 2016
;; MSG SIZE rcvd: 96
It would be unlikely for both Google Public DNS and Verisign's public resolver to have changed in that time, but as you probably never checked with them before, it's fairly likely that they always failed these wildcard CNAMEs.There probably were no changes to Google Public DNS that affected this; more likely might be that the new servers have different TTLs for the NSEC3 records and/or the RRSIG records signing them. Since the behavior is out-of-spec for the RFC it probably doesn't matter so much about mitigating details that might have allowed Google Public DNS to successfully resolve the wildcard CNAMEs with the previous resolvers.
Hey Guys,
Appreciate the response and feedback. With byte posting the additional failures on 64.6.64.6 I agree the problem is not limited to an issue with Google. (Not that it matters a ton but 75.75.75.75 worked for me without issue.) Are you able to confirm that the RFC deviation when presenting the NSEC3 hash is definitely the reason the Goggle cluster is tossing the SERVFAIL? That would be infinitely helpful in isolating the problem to a specific configuration. Thanks again for all your help!
(Not that it matters a ton but 75.75.75.75 worked for me without issue.) Are you able to confirm that the RFC deviation when presenting the NSEC3 hash is definitely the reason the Goggle cluster is tossing the SERVFAIL? That would be infinitely helpful in isolating the problem to a specific configuration. Thanks again for all your help!I've ran into the same thing on occasion. Of course, I'm probably using something different than you are for the anything. But yeah, I wish I could understand why Comcast doesn't always match up with the other two.
"Windows" was the magic word you didn't offer on the forum. With that, our mystical Google powers allow us to find this: lmgtfy.com/?q=windows+dns+wildcard+dnssec+invalid&l=1 Reading the linked Microsoft notice it does seem quite relevant; although the particular problem you're having might or might not be fixed by this update. It would certainly make sense to start by applying this update, and if you continue to have problems, you should escalate with Microsoft support. With all three major DNSSEC-validating resolvers failing your wildcard CNAMEs, it certainly seems like a bug they should fix (if their existing update doesn't already fix it). As for [previous server] not failing even though it didn't return an NSEC record - it really depends on what the RRSIG was signing. If a DNS server is generating the signature dynamically, using the queried domain name as the owner, the returned CNAME is not distinguishable from a non-wildcard response, and no NSEC/NSEC3 is required to validate it. (Note that dynamic signature generation requires the private ZSK be accessible to the DNS server, and that it have support for dynamic signing.) I don't know that either of those is the case with the RRSIG that your [previous] servers were (are) returning (the hex digits in the dig output are not particularly illuminating), but it is at least a plausible possibility. The Windows-generated RRSIG for the CNAME is using the wildcard *.dodlive.mil as the owner, and in that case an NSEC/NSEC3 (with its own RRSIG) is required, but your Windows DNS server is not providing that. Microsoft needs to fix that (and perhaps they already have). Please let us know what ends up fixing the problem, so that we can add it to our FAQ for the next person who runs into this problem.