SlideShare a Scribd company logo
3
Most read
6
Most read
Troubleshooting
- Assumptions and Problem Breakdown -
Matsuzaki ʻmazʼ Yoshinobu
<maz@iij.ad.jp>
bdNOG18 maz@iij.ad.jp 1
Simple tools are useful
• ping, traceroute, dig, and etc.
• ping:
• More powerful if you know
• The assumptions
• How to read the result
bdNOG18 maz@iij.ad.jp 2
dig soa bd @dns.bd
1. Name resolution of ”dns.bd” with the hostʼs resolver
• Actually querying ”A” and/or “AAAA” of “dns.bd”
• If name resolution fails, dig ends in error
2. Send “bd SOA” query to the resolved IP addresses
• RD (recursion desired) on by default
bdNOG18 maz@iij.ad.jp 3
dig soa bd @dns.bd
dns.bd
.bd ccTLD servers
root servers
Full-service Resolver
1) resolving “dns.bd”
2) “bd SOA” query
bdNOG18 maz@iij.ad.jp 4
when 1) fails, the command fails
dns.bd
.bd ccTLD servers
root servers
Full-service Resolver
1) resolving “dns.bd”
bdNOG18 maz@iij.ad.jp 5
Possible reasons of the failure
1. Full resolver side
• Service issue (IP reachability, packet filtering)
• named issue (process, capability, configuration)
2. Client side
• Reachability issue (IP reachability, packet filtering)
• No resolver (local resolver, nameserver configuration)
3. Authoritative server side
• Service issue (IP reachability, packet filtering)
• named issue (process, capability, configuration)
• zone configuration issue (zone cut, DNSSEC, transfer)
Engineers
can
point out
the specific
reason
bdNOG18 maz@iij.ad.jp 6
Need some !যাগাড় in case of DNS issue
• Cannot use hostname
• No problem to include QNAME in query though
• Cannot rely on Full-service Resolver functionality
• Cache contents
• Recursive mode
• DNSSEC validation
bdNOG18 maz@iij.ad.jp 7
Where to start
1. Try another Full-service resolver
• Open DNS services
• Ex. $ dig soa bd @1.1.1.1
2. Ensure you have a healthy Internet connection
• Especially TCP/53 and UDP/53 for DNS troubleshooting
3. Isolating the problem by querying authoritative servers
• IPv6 and IPv4 are different protocol
• The response can vary depending on how zone information is
cofingured
bdNOG18 maz@iij.ad.jp 8
Querying one by one
• $ dig +norec NS bd @a.root-servers.net
• +norec : To disable recursion, off the RD (Recursive Desired) bit
• NS bd : QTYPE “NS” and QNAME “bd”
• @a.root-servers.net : sending the query to a.root-servers.net
# Assuming a.root-servers.net is resolvable
• Expecting Glue records
• NS records for bd
• A and AAAA records for the bd NS servers
bdNOG18 maz@iij.ad.jp 9
4 NS hosts, 8 IP addresses
• 4 hosts serving as bd ccTLD nameservers
• dns.bd, jamuna.btcl.net.bd, surma.btcl.net.bd, and
bd-ns.anycast.pch.net
• Each host has IPv6 and IPv4 addresses
• Send a direct query to the individual IP addresses
• 8 times of ”dig +norec SOA bd @<IP address>”
bdNOG18 maz@iij.ad.jp 10
Observations at ”that” time
name-servers Query: SOA bd
dns.bd
jamuna.btcl.net.bd
surma.btcl.net.bd
SERVFAIL
bd-ns.anycast.pch.net SOA serial 2023060867
; <<>> DiG 9.10.6 <<>> ns bd @1.1.1.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41885
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; OPT=15: 00 09 6e 6f 20 53 45 50 20 6d 61 74 63 68 69 6e 67 20 74 68 65 20 44 5
3 20 66 6f 75 6e 64 20 66 6f 72 20 62 64 2e
("..no SEP matching the DS found for bd.")
; OPT=15: 00 17 31 32 33 2e 34 39 2e 31 32 2e 31 31 32 3a 35 33 20 72 63 6f 64 6
5 3d 53 45 52 56 46 41 49 4c 20 66 6f 72 20 62 64 20 44 4e 53 4b 45 59
("..123.49.12.112:53 rcode=SERVFAIL for bd DNSKEY")
Only one out of four could
responds without DNS error
DNSSEC failure on bd
bdNOG18 maz@iij.ad.jp 11
Some tricky parts
*1) gov.bd, com.bd, net.bd, org.bd, ac.bd, and so on
• Those are not DNSSEC-signed
• If you did “dig +norec www.bdren.net.bd @123.49.12.112”
at ”that” time, it worked as expected
name-servers SOA bd SOA for subdomains (*1)
dns.bd
jamuna.btcl.net.bd
surma.btcl.net.bd
SERVFAIL OK
bd-ns.anycast.pch.net SOA serial 2023060867 OK
bdNOG18 maz@iij.ad.jp 12
Several zones in a server
• Even the parent (bd) zone is failed,
the servers can reply an answer from
its subdomain (ex. net.bd) zone
.bd ccTLD servers
www.bdren.net.bd query
bd zone
gov.bd zone
com.bd zone
net.bd zone
bdNOG18 maz@iij.ad.jp 13
My guess at ”that” time
• 3 nameservers failed to load bd zone file
• Could be some DNSSEC singing issues, as other un-signed
subdomains were loaded as expected
• 1 nameserver kept (old) bd zone file and answering
• RRSIG (digital signature by DNSSEC) was expired
• This caused DNSSEC verification error
• Worked as expected for the system, but unexpected for users
bdNOG18 maz@iij.ad.jp 14
Some possible improvements
• Monitoring
• Zone file generation
• Singing and transfer
• SOA serial sync among nameservers
• Point of Contact
• Trouble information
• Technical information
bdNOG18 maz@iij.ad.jp 15
Example: JP DNS
• The nameservers for the .jp ccTLD are managed by the
JPRS, the .jp registry, with the cooperation of various
organizations in the Japanese internet industry.
Server name Organization
a.dns.jp JPRS (.jp Registry)
b.dns.jp JPNIC (Japan NIR)
c.dns.jp JPRS
d.dns.jp IIJ (Commercial ISP)
e.dns.jp WIDE (Research Consortium)
f.dns.jp NII (Academic Research Institute)
g.dns.jp JPRS
h.dns.jp JPRS
bdNOG18 maz@iij.ad.jp 16

More Related Content

PDF
Troubleshooting DNS with dig
PDF
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
PPTX
DNS_Tutorial 2.pptx
PDF
Domain Name System (DNS) Fundamentals
PDF
DNS in IR: Collection, Analysis and Response
PDF
NZNOG 2013 - Experiments in DNSSEC
PPTX
2_Chapter 2_DNS.pptx
PDF
2 technical-dns-workshop-day1
Troubleshooting DNS with dig
Using ~300 Billion DNS Queries to Analyse the TLD Name Collision Problem
DNS_Tutorial 2.pptx
Domain Name System (DNS) Fundamentals
DNS in IR: Collection, Analysis and Response
NZNOG 2013 - Experiments in DNSSEC
2_Chapter 2_DNS.pptx
2 technical-dns-workshop-day1

Similar to DNS Troubleshooting - Assumptions and Problem Breakdown (20)

PDF
Anomaly detection in dns traffic
PPTX
IPv6 and the DNS, RIPE 73
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
DNS Fundamentals Presentation_PANDI-2022.pdf
PPTX
HKNOG 5.0 - NSEC caching
PDF
What You Need to Know - Domain Name System (DNS)
PPT
p046_pp7.ppt
PDF
DNS Over HTTPS by Michael Casadevall
PDF
OSMC 2016 - DNS Monitoring from Several Vantage Points by Stéphane Bortzmeyer
PPT
THBTHRTHRETHBTHJNRTFGNJRFTJNTNJMRTJNTTHJR
PDF
Hands-on DNSSEC Deployment
PPTX
DNS for Developers - NDC Oslo 2016
PPT
Introduction
PPTX
bdNOG 7 - Re-engineering the DNS - one resolver at a time
PDF
Lets talk dns
PPTX
Introduction to DNS
PDF
OARC 26: Who's asking
PDF
A curious case of broken DNS responses (Coloclue Presents - Nov 2019)
PDF
dns-sec-4-slides
Anomaly detection in dns traffic
IPv6 and the DNS, RIPE 73
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS Fundamentals Presentation_PANDI-2022.pdf
HKNOG 5.0 - NSEC caching
What You Need to Know - Domain Name System (DNS)
p046_pp7.ppt
DNS Over HTTPS by Michael Casadevall
OSMC 2016 - DNS Monitoring from Several Vantage Points by Stéphane Bortzmeyer
THBTHRTHRETHBTHJNRTFGNJRFTJNTNJMRTJNTTHJR
Hands-on DNSSEC Deployment
DNS for Developers - NDC Oslo 2016
Introduction
bdNOG 7 - Re-engineering the DNS - one resolver at a time
Lets talk dns
Introduction to DNS
OARC 26: Who's asking
A curious case of broken DNS responses (Coloclue Presents - Nov 2019)
dns-sec-4-slides
Ad

More from Bangladesh Network Operators Group (20)

PDF
IPv6 Mostly Experience at APRICOT by Yoshinobu Matsuzaki (IIJ)
PDF
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
PDF
DDoS Mitigation Strategies by Md. Abdul Awal
PDF
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
PPTX
The Internet Service Providers and Connectivity Providers of ICANN
PPTX
Integration of AI and GenAI in Education and beyond
PPTX
Strengthening Cyber Security with Tools and Human Expertise
PDF
Mental Health and Workplace Culture in Tech:A Personal Perspective
PDF
Network Efficiency:The LLM Advantage on network infrastructures
PDF
Utilizing Free and open-source Technology and Achieve Next Generation Enterpr...
PPTX
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
PPTX
Maximizing Network Efficiency with Large Language Models (LLM)
PPTX
Geolocation and Geofeed Implementation bdNOG18
PDF
Data Centre Design Consideration for Bangladesh
PPTX
Team Cymru Community Services,Overview of all public services
PPTX
Open Source TCP or Netflow Log Server Using Graylog
PPTX
Enhancing seamless access using TIGERfed
PPTX
Software Defined Networking, Concepts and Practical Implementations
PDF
IPv6 Deployment Planning and Security Considerations
PDF
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
IPv6 Mostly Experience at APRICOT by Yoshinobu Matsuzaki (IIJ)
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
DDoS Mitigation Strategies by Md. Abdul Awal
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
The Internet Service Providers and Connectivity Providers of ICANN
Integration of AI and GenAI in Education and beyond
Strengthening Cyber Security with Tools and Human Expertise
Mental Health and Workplace Culture in Tech:A Personal Perspective
Network Efficiency:The LLM Advantage on network infrastructures
Utilizing Free and open-source Technology and Achieve Next Generation Enterpr...
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
Maximizing Network Efficiency with Large Language Models (LLM)
Geolocation and Geofeed Implementation bdNOG18
Data Centre Design Consideration for Bangladesh
Team Cymru Community Services,Overview of all public services
Open Source TCP or Netflow Log Server Using Graylog
Enhancing seamless access using TIGERfed
Software Defined Networking, Concepts and Practical Implementations
IPv6 Deployment Planning and Security Considerations
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Ad

Recently uploaded (20)

PPTX
Introduction to Information and Communication Technology
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Internet___Basics___Styled_ presentation
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Funds Management Learning Material for Beg
PPTX
innovation process that make everything different.pptx
Introduction to Information and Communication Technology
The Internet -By the Numbers, Sri Lanka Edition
Cloud-Scale Log Monitoring _ Datadog.pdf
Job_Card_System_Styled_lorem_ipsum_.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Internet___Basics___Styled_ presentation
WebRTC in SignalWire - troubleshooting media negotiation
Unit-1 introduction to cyber security discuss about how to secure a system
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Testing WebRTC applications at scale.pdf
Introuction about WHO-FIC in ICD-10.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
SAP Ariba Sourcing PPT for learning material
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Power Point - Lesson 3_2.pptx grad school presentation
Paper PDF World Game (s) Great Redesign.pdf
Introduction to the IoT system, how the IoT system works
Funds Management Learning Material for Beg
innovation process that make everything different.pptx

DNS Troubleshooting - Assumptions and Problem Breakdown

  • 1. Troubleshooting - Assumptions and Problem Breakdown - Matsuzaki ʻmazʼ Yoshinobu <maz@iij.ad.jp> bdNOG18 maz@iij.ad.jp 1
  • 2. Simple tools are useful • ping, traceroute, dig, and etc. • ping: • More powerful if you know • The assumptions • How to read the result bdNOG18 maz@iij.ad.jp 2
  • 3. dig soa bd @dns.bd 1. Name resolution of ”dns.bd” with the hostʼs resolver • Actually querying ”A” and/or “AAAA” of “dns.bd” • If name resolution fails, dig ends in error 2. Send “bd SOA” query to the resolved IP addresses • RD (recursion desired) on by default bdNOG18 maz@iij.ad.jp 3
  • 4. dig soa bd @dns.bd dns.bd .bd ccTLD servers root servers Full-service Resolver 1) resolving “dns.bd” 2) “bd SOA” query bdNOG18 maz@iij.ad.jp 4
  • 5. when 1) fails, the command fails dns.bd .bd ccTLD servers root servers Full-service Resolver 1) resolving “dns.bd” bdNOG18 maz@iij.ad.jp 5
  • 6. Possible reasons of the failure 1. Full resolver side • Service issue (IP reachability, packet filtering) • named issue (process, capability, configuration) 2. Client side • Reachability issue (IP reachability, packet filtering) • No resolver (local resolver, nameserver configuration) 3. Authoritative server side • Service issue (IP reachability, packet filtering) • named issue (process, capability, configuration) • zone configuration issue (zone cut, DNSSEC, transfer) Engineers can point out the specific reason bdNOG18 maz@iij.ad.jp 6
  • 7. Need some !যাগাড় in case of DNS issue • Cannot use hostname • No problem to include QNAME in query though • Cannot rely on Full-service Resolver functionality • Cache contents • Recursive mode • DNSSEC validation bdNOG18 maz@iij.ad.jp 7
  • 8. Where to start 1. Try another Full-service resolver • Open DNS services • Ex. $ dig soa bd @1.1.1.1 2. Ensure you have a healthy Internet connection • Especially TCP/53 and UDP/53 for DNS troubleshooting 3. Isolating the problem by querying authoritative servers • IPv6 and IPv4 are different protocol • The response can vary depending on how zone information is cofingured bdNOG18 maz@iij.ad.jp 8
  • 9. Querying one by one • $ dig +norec NS bd @a.root-servers.net • +norec : To disable recursion, off the RD (Recursive Desired) bit • NS bd : QTYPE “NS” and QNAME “bd” • @a.root-servers.net : sending the query to a.root-servers.net # Assuming a.root-servers.net is resolvable • Expecting Glue records • NS records for bd • A and AAAA records for the bd NS servers bdNOG18 maz@iij.ad.jp 9
  • 10. 4 NS hosts, 8 IP addresses • 4 hosts serving as bd ccTLD nameservers • dns.bd, jamuna.btcl.net.bd, surma.btcl.net.bd, and bd-ns.anycast.pch.net • Each host has IPv6 and IPv4 addresses • Send a direct query to the individual IP addresses • 8 times of ”dig +norec SOA bd @<IP address>” bdNOG18 maz@iij.ad.jp 10
  • 11. Observations at ”that” time name-servers Query: SOA bd dns.bd jamuna.btcl.net.bd surma.btcl.net.bd SERVFAIL bd-ns.anycast.pch.net SOA serial 2023060867 ; <<>> DiG 9.10.6 <<>> ns bd @1.1.1.1 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41885 ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 1232 ; OPT=15: 00 09 6e 6f 20 53 45 50 20 6d 61 74 63 68 69 6e 67 20 74 68 65 20 44 5 3 20 66 6f 75 6e 64 20 66 6f 72 20 62 64 2e ("..no SEP matching the DS found for bd.") ; OPT=15: 00 17 31 32 33 2e 34 39 2e 31 32 2e 31 31 32 3a 35 33 20 72 63 6f 64 6 5 3d 53 45 52 56 46 41 49 4c 20 66 6f 72 20 62 64 20 44 4e 53 4b 45 59 ("..123.49.12.112:53 rcode=SERVFAIL for bd DNSKEY") Only one out of four could responds without DNS error DNSSEC failure on bd bdNOG18 maz@iij.ad.jp 11
  • 12. Some tricky parts *1) gov.bd, com.bd, net.bd, org.bd, ac.bd, and so on • Those are not DNSSEC-signed • If you did “dig +norec www.bdren.net.bd @123.49.12.112” at ”that” time, it worked as expected name-servers SOA bd SOA for subdomains (*1) dns.bd jamuna.btcl.net.bd surma.btcl.net.bd SERVFAIL OK bd-ns.anycast.pch.net SOA serial 2023060867 OK bdNOG18 maz@iij.ad.jp 12
  • 13. Several zones in a server • Even the parent (bd) zone is failed, the servers can reply an answer from its subdomain (ex. net.bd) zone .bd ccTLD servers www.bdren.net.bd query bd zone gov.bd zone com.bd zone net.bd zone bdNOG18 maz@iij.ad.jp 13
  • 14. My guess at ”that” time • 3 nameservers failed to load bd zone file • Could be some DNSSEC singing issues, as other un-signed subdomains were loaded as expected • 1 nameserver kept (old) bd zone file and answering • RRSIG (digital signature by DNSSEC) was expired • This caused DNSSEC verification error • Worked as expected for the system, but unexpected for users bdNOG18 maz@iij.ad.jp 14
  • 15. Some possible improvements • Monitoring • Zone file generation • Singing and transfer • SOA serial sync among nameservers • Point of Contact • Trouble information • Technical information bdNOG18 maz@iij.ad.jp 15
  • 16. Example: JP DNS • The nameservers for the .jp ccTLD are managed by the JPRS, the .jp registry, with the cooperation of various organizations in the Japanese internet industry. Server name Organization a.dns.jp JPRS (.jp Registry) b.dns.jp JPNIC (Japan NIR) c.dns.jp JPRS d.dns.jp IIJ (Commercial ISP) e.dns.jp WIDE (Research Consortium) f.dns.jp NII (Academic Research Institute) g.dns.jp JPRS h.dns.jp JPRS bdNOG18 maz@iij.ad.jp 16