[BALUG-Talk] test DNS that returns SERVFAIL? ... ! :-)
Michael Paoli
Michael.Paoli@cal.berkeley.edu
Sun Apr 19 02:58:35 UTC 2020
Anyway, removed (servfail.balug.org.) for at least now.
It had been getting a bit too regularly annoying.
E.g.:
# ~/bin/Named-checkconf
zone balug.org/IN: servfail.balug.org/NS 'servfail.balug.org' has no
REQUIRED GLUE address records (A or AAAA)
# echo $?
1
#
Maybe some other time some other way ... but not for now.
> From: "Michael Paoli" <Michael.Paoli@cal.berkeley.edu>
> Subject: test DNS that returns SERVFAIL? ... ! :-)
> Date: Mon, 13 Apr 2020 03:14:35 -0700
> test DNS that returns SERVFAIL? ... ! :-)
>
> For when one may want a target DNS domain to test against that will
> generally return SERVFAIL ... I didn't super easily find one out there,
> so ... (at least for now) created one.
> ... on the master (IPs for the MNAME in SOA are on this host)
> $ hostname
> balug-sf-lug-v2.balug.org
> $ dig +noall +answer +multiline balug.org. SOA | awk '{if(NR==1)print $5;}'
> ns0.balug.org.
> $ dig +short ns0.balug.org. A ns0.balug.org. AAAA
> 96.86.170.229
> 2001:470:1f05:19e::2
> $ ip a s | egrep 'inet.*(96\.86\.170\.229|2001:470:1f05:19e::2)'
> inet 96.86.170.229/29 brd 96.86.170.231 scope global eth0
> inet6 2001:470:1f05:19e::2/64 scope global
> $
> So, add RR:
> # nsupdate -l << \.
> update add servfail.balug.org. 300 IN NS servfail.balug.org.
> send
> .
>
> #
> Ah yes, I'm quite starting to get used to and like/prefer dynamic DNS
> update. Significantly more goof-resistant, and most of the time I don't
> even have to think about the zone serial number. Which reminds me,
> I do still want to add some version "control" (tracking) ... driven via
> cron, so I'll at least have periodic snapshots of changes (since no
> longer using ye olde manual method & manual version control). For
> more recent changes, and fine-grained history of changes, logs cover
> that quite well. But for the longer historical record ... wee bit 'o
> gap presently to fill on that.
> Automation is generally a good thing. :-)
>
> And with no other (explicit - some DNSSEC automagic bits may be added
> but we'll ignore those presently) RRs for that domain.
> So, we then typically get, e.g.:
> $ dig +noall +answer +comments servfail.balug.org.
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 26642
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
> $
>
> Note that not all flavors of query against servfail.balug.org. will
> return SERVFAIL:
>
> $ dig +noall +norecurse +answer +authority +comments @ns0.balug.org.
> servfail.balug.org.
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20976
> ;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 4096
> ;; AUTHORITY SECTION:
> servfail.balug.org. 300 IN NS servfail.balug.org.
>
> $
>
> But in general, trying to do a recursive query on the domain for most RR
> types, will give SERVFAIL. (Useful for testing, ...)
More information about the BALUG-Talk
mailing list