[Pkg-dns-devel] Bug#859337: Bug#859337: Bug#859337: unbound: 1.6.0-3 breaks resolving deb.debian.org

Robert Edmonds edmonds at debian.org
Mon Apr 3 02:51:33 UTC 2017


Julien Cristau wrote:
> On 04/02/2017 10:07 AM, Robert Edmonds wrote:
> > Julien Cristau wrote:
> >> Package: unbound
> >> Version: 1.6.0-3
> >> Severity: grave
> >>
> >> Hi,
> >>
> >> after upgrading from 1.6.0-2 to 1.6.0-3 unbound can't seem to be able to
> >> resolve deb.debian.org.  Upping the verbosity I get the feeling it's
> >> alternating between querying deb.debian.org DS and static.debian.org DS,
> >> never going up to debian.org DS.  Downgrading makes things work again.
> >>
> >> Apr  2 15:49:55 tomate unbound: [685:0] info: resolving deb.debian.org. A IN
> >> Apr  2 15:49:55 tomate unbound: [685:0] info: resolving deb.debian.org. A IN
> >> Apr  2 15:49:55 tomate unbound: [685:0] info: resolving deb.debian.org.
> >> DS IN
> >> Apr  2 15:49:56 tomate unbound: [685:0] info: response for
> >> deb.debian.org. DS IN
> >> Apr  2 15:49:56 tomate unbound: [685:0] info: reply from <.> 4.2.2.1#53
> > 
> > Hi, Julien:
> > 
> > Are you forwarding queries to 4.2.2.1?
> > 
> Looks like it's in the domain-name-servers dhcp option on this network,
> so yes (through dnssec-trigger).
> 
> > Could you send your unbound.conf and any conf.d files and I'll try to
> > replicate the problem?
> > 
> unbound.conf says
> include: "/etc/unbound/unbound.conf.d/*.conf"
> 
> The entries in unbound.conf.d set "qname-minimisation: yes" and
> "auto-trust-anchor-file: "/var/lib/unbound/root.key""
> 
> And then dnssec-trigger sets the forwarding.

Hi, Julien:

It's very unlikely that this was a regression introduced in 1.6.0-3. The
only change between 1.6.0-2 and 1.6.0-3 was to cherry-pick the updated
root trust anchor for the upcoming DNSSEC root KSK rollover, which
should have no impact on DNSSEC validation until that rollover actually
begins. More likely, I would guess that there is some problem with the
4.2.2.1 resolver from your location that breaks DNSSEC validation, and
when you downgraded to 1.6.0-2, the forwarding configuration got lost
somehow and Unbound started performing full recursion. You can test
whether forwarding is enabled for the running Unbound by running
'unbound-control forward' as root, which should print something like
"4.2.2.1" or "off (using root hints)".

If I recall correctly, Unbound requires that the upstream resolver
itself perform DNSSEC validation, and the 4.2.2.1 nameserver doesn't
perform DNSSEC validation, at least the instance that I queried. (The
4.2.2.x nameservers are anycasted.)

You might try posting to the unbound-users mailing list
(https://open.nlnetlabs.nl/mailman/listinfo/unbound-users) about your
issue, since the upstream developers are generally pretty good about
helping users debug DNSSEC validation issues.

-- 
Robert Edmonds
edmonds at debian.org



More information about the pkg-dns-devel mailing list