Groups | Search | Server Info | Keyboard shortcuts | Login | Register


Groups > comp.protocols.dns.bind > #16049

intermittent failures and queries sent over TCP

Path csiph.com!3.eu.feeder.erje.net!feeder.erje.net!news.etla.org!nntp-feed.chiark.greenend.org.uk!ewrotcd!usenet-its.stanford.edu!usenet.stanford.edu!not-for-mail
From David Newman <dnewman@networktest.com>
Newsgroups comp.protocols.dns.bind
Subject intermittent failures and queries sent over TCP
Date Tue, 18 Aug 2020 17:34:41 -0700
Lines 120
Approved bind-users@lists.isc.org
Message-ID <mailman.802.1597797253.942.bind-users@lists.isc.org> (permalink)
References <6538a35f-d361-7522-a34f-65defb021f05@networktest.com>
NNTP-Posting-Host lists.isc.org
Mime-Version 1.0
Content-Type text/plain; charset=utf-8
Content-Transfer-Encoding 7bit
X-Trace usenet.stanford.edu 1597797302 5790 149.20.1.60 (19 Aug 2020 00:35:02 GMT)
X-Complaints-To action@cs.stanford.edu
To bind-users@lists.isc.org
Return-Path <dnewman@networktest.com>
X-Original-To bind-users@lists.isc.org
Delivered-To bind-users@lists.isc.org
Authentication-Results mail9.networktest.com (amavisd-new); dkim=pass (1024-bit key) reason="pass (just generated, assumed good)" header.d=networktest.com
DKIM-Signature v=1; a=rsa-sha256; c=relaxed/simple; d=networktest.com; h=content-transfer-encoding:content-language:content-type :mime-version:user-agent:date:message-id:subject:from:to; s= dkim; t=1597797282; x=1600389283; bh=DQSPMrBYjjyo0xxeHkJqwwYrxlg yaAexY5SGZwF9Ea8=; b=mPucdpzfYGwHj2MlgpoFW522w01f3nAH+maa+BFT4jf WnUxY/M5ZG2eQFOibp4JgtALJQeQ3f/pdb9HgcgaivlAqwuvkn7shaoiMCn/Obr8 hE9RZyDE7cqT7LIRtcjZAhhvkAZ5FvpzWwjM7rdNsldbjETxkW6uZOM77lO7oJ+Y =
X-Virus-Scanned Debian amavisd-new at mail9.networktest.com
X-Spam-Score 0
X-Spam-Level
X-Spam-Status No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=disabled version=3.4.2
User-Agent Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.11.0
Content-Language en-GB
X-Spam-Checker-Version SpamAssassin 3.4.2 (2018-09-13) on mx.pao1.isc.org
X-BeenThere bind-users@lists.isc.org
X-Mailman-Version 2.1.29
Precedence list
List-Id BIND Users Mailing List <bind-users.lists.isc.org>
List-Unsubscribe <https://lists.isc.org/mailman/options/bind-users>, <mailto:bind-users-request@lists.isc.org?subject=unsubscribe>
List-Archive <https://lists.isc.org/pipermail/bind-users/>
List-Post <mailto:bind-users@lists.isc.org>
List-Help <mailto:bind-users-request@lists.isc.org?subject=help>
List-Subscribe <https://lists.isc.org/mailman/listinfo/bind-users>, <mailto:bind-users-request@lists.isc.org?subject=subscribe>
X-Mailman-Original-Message-ID <6538a35f-d361-7522-a34f-65defb021f05@networktest.com>
Xref csiph.com comp.protocols.dns.bind:16049

Show key headers only | View raw


bind 9.11.5.P4 on Debian 10

Greetings. I recently had to migrate a nameserver from FreeBSD to
Debian. It works fine most of the time but I've noticed a few
intermittent resolution failures.

After "gmail.com" failed to resolve I took a packet capture using
tcpdump to listen to the result of the command "dig -t mx gmail.com" and
here's what I found:

1. That query over UDP, with responses over UDP pointing to Google's
nameservers

2. Nearly 200 attempts to reach root servers over TCP, followed
immediately by RST messages from the root servers.

Some time later, gmail.com started resolving succesfully again, clearing
up the issue for now.

AFAIK there's nothing in the BIND configs that would force the use of
TCP queries. I checked the docs for various TCP options and didn't see
any applied here. I don't know if the TCP queries are related to the
gmail.com resolution failure but I suspect they are (and in any event
inability to reach root servers is a problem).

This server is authoritative for several domains. It gets its zones from
a hidden primary. The system's firewall permits inbound TCP and UDP
traffic on port 53 and AFAIK does not block outbound UDP (the firewall
is nftables, which is new to me, but since I see UDP queries in the
packet capture I think it works).

What would cause the server to send queries over TCP?

Thanks in advance for troubleshooting clues.


dn



CONFIG FILES

(named.conf is just pointers to .local and .options and .default-zones)

// named.conf.local

acl "xfer" {
// redacted -- a list of IPv4 and IPv6 addresses I trust
};

controls {
        inet 127.0.0.1 port 953 allow { 127.0.0.1; };
};

logging {
	channel simple_log {
		file "/var/log/named/named.log" versions 30 size 1m;
		severity info;
		print-time yes;
		print-severity yes;
		print-category yes;
	};
	category default { simple_log; };
	category update { simple_log; };
	category update-security { simple_log; };
	category security { simple_log; };
	category queries { simple_log; };
	category lame-servers { null; };
};

zone  "example1.org" in {
        type slave;
        file "example1.org.bak";
        masters { 198.18.0.53; }; // not the real address
        allow-query { any; };
        allow-transfer { xfer; };
};

zone  "example2.org" in {
        type slave;
        file "example2.org.bak";
        masters { 198.18.0.53; }; // not the real address
        allow-query { any; };
        allow-transfer { xfer; };
};

// etc.


// named.conf.options

acl "trusted" {

        // redacted -- a list of IPv4 and IPv6 addresses I trust
};

options {
	directory "/var/cache/bind";
	pid-file        "/var/run/named/named.pid";
        statistics-file "/var/run/named/named.stats";
        transfer-format many-answers;
        masterfile-format text;
        max-transfer-time-in 60;
        allow-query { any; };
        allow-recursion { trusted; };
        allow-query-cache { trusted; };
        allow-transfer { xfer; };
        version none;

		disable-empty-zone "255.255.255.255.IN-ADDR.ARPA";
		disable-empty-zone
"0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";
		disable-empty-zone
"1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA";


	querylog yes;


};

Back to comp.protocols.dns.bind | Previous | Next | Find similar


Thread

intermittent failures and queries sent over TCP David Newman <dnewman@networktest.com> - 2020-08-18 17:34 -0700

csiph-web