Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Random DNSSEC errors after 12.1 update #890

Open
claudio4 opened this issue Mar 25, 2024 · 12 comments
Open

Random DNSSEC errors after 12.1 update #890

claudio4 opened this issue Mar 25, 2024 · 12 comments

Comments

@claudio4
Copy link

After upgrading my server to version 12.1 using the Docker image, I've observed that the resolution of certain domains occasionally fails at random. When this issue arises, attempts to resolve the domain continue to fail for a period, and then, after about a minute, the issue resolves itself without any manual intervention. It's important to note that this only occurs with certain domains, and while I have not observed it affecting two different domains simultaneously, I cannot rule out the possibility. Meanwhile, the resolver functions perfectly for other domains, even when the affected ones are failing.

I checked the logs and when this issue occurs, this exception gets printed in the log:

[2024-03-24 13:19:21 UTC] DNS Server failed to resolve the request 'mt-proxy.cl4.es. A IN' using forwarders: cloudflare-dns.com:853 (1.1.1.1), cloudflare-dns.com:853 (1.0.0.1), dns.quad9.net:853 (9.9.9.9), dns.quad9.net:853 (149.112.112.112).
TechnitiumLibrary.Net.Dns.DnsClientResponseDnssecValidationException: DNSSEC validation failed due to missing RRSIG for owner name: mt-proxy.cl4.es/CNAME
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateSignatureAsync(DnsDatagram response, IReadOnlyList`1 records, IReadOnlyList`1 dnsKeyRecords, IReadOnlyList`1 unsignedZones, DnssecValidateSignatureParameters parameters, Boolean isAuthoritySection, Boolean isAdditionalSection) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2959
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateSignatureAsync(DnsDatagram response, IReadOnlyList`1 dnsKeyRecords, IReadOnlyList`1 unsignedZones) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2730
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateResponseAsync(DnsDatagram response, IReadOnlyList`1 lastDSRecords, DnsClient dnsClient, IDnsCache cache, UInt16 udpPayloadSize, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2566
   at TechnitiumLibrary.Net.Dns.DnsClient.InternalDnssecResolveAsync(DnsQuestionRecord question, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4692
   at TechnitiumLibrary.Net.Dns.DnsClient.<>c__DisplayClass91_0.<<InternalCachedResolveQueryAsync>b__0>d.MoveNext() in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4754
--- End of stack trace from previous location ---
   at TechnitiumLibrary.Net.Dns.DnsClient.ResolveQueryAsync(DnsQuestionRecord question, Func`2 resolveAsync) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4103
   at TechnitiumLibrary.Net.Dns.DnsClient.InternalCachedResolveQueryAsync(DnsQuestionRecord question, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4736
   at DnsServerCore.Dns.DnsServer.RecursiveResolveAsync(DnsQuestionRecord question, NetworkAddress eDnsClientSubnet, Boolean advancedForwardingClientSubnet, IReadOnlyList`1 conditionalForwarders, Boolean dnssecValidation, Boolean cachePrefetchOperation, Boolean cacheRefreshOperation, Boolean skipDnsAppAuthoritativeRequestHandlers, TaskCompletionSource`1 taskCompletionSource) in Z:\Technitium\Projects\DnsServer\DnsServerCore\Dns\DnsServer.cs:line 3193
[2024-03-24 13:38:57 UTC] DNS Server failed to resolve the request 'ocsp.pki.goog. A IN' using forwarders: cloudflare-dns.com:853 (1.1.1.1), cloudflare-dns.com:853 (1.0.0.1), dns.quad9.net:853 (9.9.9.9), dns.quad9.net:853 (149.112.112.112).
TechnitiumLibrary.Net.Dns.DnsClientResponseDnssecValidationException: DNSSEC validation failed due to missing RRSIG for owner name: ocsp.pki.goog/CNAME
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateSignatureAsync(DnsDatagram response, IReadOnlyList`1 records, IReadOnlyList`1 dnsKeyRecords, IReadOnlyList`1 unsignedZones, DnssecValidateSignatureParameters parameters, Boolean isAuthoritySection, Boolean isAdditionalSection) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2959
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateSignatureAsync(DnsDatagram response, IReadOnlyList`1 dnsKeyRecords, IReadOnlyList`1 unsignedZones) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2730
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateResponseAsync(DnsDatagram response, IReadOnlyList`1 lastDSRecords, DnsClient dnsClient, IDnsCache cache, UInt16 udpPayloadSize, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2566
   at TechnitiumLibrary.Net.Dns.DnsClient.InternalDnssecResolveAsync(DnsQuestionRecord question, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4692
   at TechnitiumLibrary.Net.Dns.DnsClient.<>c__DisplayClass91_0.<<InternalCachedResolveQueryAsync>b__0>d.MoveNext() in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4754
--- End of stack trace from previous location ---
   at TechnitiumLibrary.Net.Dns.DnsClient.ResolveQueryAsync(DnsQuestionRecord question, Func`2 resolveAsync) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4103
   at TechnitiumLibrary.Net.Dns.DnsClient.InternalCachedResolveQueryAsync(DnsQuestionRecord question, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4736
   at DnsServerCore.Dns.DnsServer.RecursiveResolveAsync(DnsQuestionRecord question, NetworkAddress eDnsClientSubnet, Boolean advancedForwardingClientSubnet, IReadOnlyList`1 conditionalForwarders, Boolean dnssecValidation, Boolean cachePrefetchOperation, Boolean cacheRefreshOperation, Boolean skipDnsAppAuthoritativeRequestHandlers, TaskCompletionSource`1 taskCompletionSource) in Z:\Technitium\Projects\DnsServer\DnsServerCore\Dns\DnsServer.cs:line 3193

If I use the DNS Client built-in in the webUI with the server set to "This Server" and with "Enable DNSSEC Validation" and the issue arises, I get this response:

{
  "Metadata": {
    "NameServer": "technitium.sb.cl4.es (10.69.0.20)",
    "Protocol": "Udp",
    "DatagramSize": "291 bytes",
    "RoundTripTime": "154.04 ms"
  },
  "EDNS": {
    "UdpPayloadSize": 1232,
    "ExtendedRCODE": "NoError",
    "Version": 0,
    "Flags": "DNSSEC_OK",
    "Options": [
      {
        "Code": "EXTENDED_DNS_ERROR",
        "Length": "2 bytes",
        "Data": {
          "InfoCode": "StaleAnswer",
          "ExtraText": null
        }
      }
    ]
  },
  "DnsClientExtendedErrors": [
    {
      "InfoCode": "SignatureExpired",
      "ExtraText": "mt-proxy.cl4.es CNAME IN"
    }
  ],
  "Identifier": 0,
  "IsResponse": true,
  "OPCODE": "StandardQuery",
  "AuthoritativeAnswer": false,
  "Truncation": false,
  "RecursionDesired": true,
  "RecursionAvailable": true,
  "Z": 0,
  "AuthenticData": true,
  "CheckingDisabled": true,
  "RCODE": "NoError",
  "QDCOUNT": 1,
  "ANCOUNT": 4,
  "NSCOUNT": 0,
  "ARCOUNT": 1,
  "Question": [
    {
      "Name": "mt-proxy.cl4.es",
      "Type": "A",
      "Class": "IN"
    }
  ],
  "Answer": [
    {
      "Name": "mt-proxy.cl4.es",
      "Type": "CNAME",
      "Class": "IN",
      "TTL": "30 (30 sec)",
      "RDLENGTH": "9 bytes",
      "RDATA": {
        "Domain": "oc0.oc.cl4.es"
      },
      "DnssecStatus": "Bogus"
    },
    {
      "Name": "mt-proxy.cl4.es",
      "Type": "RRSIG",
      "Class": "IN",
      "TTL": "30 (30 sec)",
      "RDLENGTH": "90 bytes",
      "RDATA": {
        "TypeCovered": "CNAME",
        "Algorithm": "ECDSAP256SHA256",
        "Labels": 3,
        "OriginalTtl": 300,
        "SignatureExpiration": "2024-03-25T16:11:19Z",
        "SignatureInception": "2024-03-23T14:11:19Z",
        "KeyTag": 34505,
        "SignersName": "cl4.es",
        "Signature": "oQKTKsBK3c7w4noNDHHBS2TcBK3N3Kv+4COaBnRknvPgpjdZOAcVRC2dJgeIk0tU0/BLe10bNEaia8w0oI5Mng=="
      },
      "DnssecStatus": "Bogus"
    },
    {
      "Name": "oc0.oc.cl4.es",
      "Type": "A",
      "Class": "IN",
      "TTL": "30 (30 sec)",
      "RDLENGTH": "4 bytes",
      "RDATA": {
        "IPAddress": "129.151.70.133"
      },
      "DnssecStatus": "Unknown"
    },
    {
      "Name": "oc0.oc.cl4.es",
      "Type": "RRSIG",
      "Class": "IN",
      "TTL": "30 (30 sec)",
      "RDLENGTH": "90 bytes",
      "RDATA": {
        "TypeCovered": "A",
        "Algorithm": "ECDSAP256SHA256",
        "Labels": 4,
        "OriginalTtl": 300,
        "SignatureExpiration": "2024-03-25T17:00:50Z",
        "SignatureInception": "2024-03-23T15:00:50Z",
        "KeyTag": 34505,
        "SignersName": "cl4.es",
        "Signature": "qHSQzK9VoPk2+deLZ30+6v90P1Y+tj9jKxK6tHZuydoOXrwo1Xfydh1mEZqBkPooy/dlGvZqU94xdm+7jQS6ig=="
      },
      "DnssecStatus": "Unknown"
    }
  ],
  "Authority": [],
  "Additional": [
    {
      "Name": "",
      "Type": "OPT",
      "Class": "1232",
      "TTL": "32768 (9 hours 6 mins 8 sec)",
      "RDLENGTH": "6 bytes",
      "RDATA": {
        "Options": [
          {
            "Code": "EXTENDED_DNS_ERROR",
            "Length": "2 bytes",
            "Data": {
              "InfoCode": "StaleAnswer",
              "ExtraText": null
            }
          }
        ]
      },
      "DnssecStatus": "Unknown"
    }
  ]
}

But just waiting a bit a pressing the resolve button again gets me this successful response:

{
  "Metadata": {
    "NameServer": "technitium.sb.cl4.es (10.69.0.20)",
    "Protocol": "Udp",
    "DatagramSize": "593 bytes",
    "RoundTripTime": "74.77 ms"
  },
  "EDNS": {
    "UdpPayloadSize": 1232,
    "ExtendedRCODE": "NoError",
    "Version": 0,
    "Flags": "DNSSEC_OK",
    "Options": [
      {
        "Code": "PADDING",
        "Length": "304 bytes",
        "Data": {
          "Data": "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=="
        }
      }
    ]
  },
  "Identifier": 0,
  "IsResponse": true,
  "OPCODE": "StandardQuery",
  "AuthoritativeAnswer": false,
  "Truncation": false,
  "RecursionDesired": true,
  "RecursionAvailable": true,
  "Z": 0,
  "AuthenticData": false,
  "CheckingDisabled": true,
  "RCODE": "NoError",
  "QDCOUNT": 1,
  "ANCOUNT": 4,
  "NSCOUNT": 0,
  "ARCOUNT": 1,
  "Question": [
    {
      "Name": "mt-proxy.cl4.es",
      "Type": "A",
      "Class": "IN"
    }
  ],
  "Answer": [
    {
      "Name": "mt-proxy.cl4.es",
      "Type": "CNAME",
      "Class": "IN",
      "TTL": "300 (5 mins)",
      "RDLENGTH": "9 bytes",
      "RDATA": {
        "Domain": "oc0.oc.cl4.es"
      },
      "DnssecStatus": "Secure"
    },
    {
      "Name": "mt-proxy.cl4.es",
      "Type": "RRSIG",
      "Class": "IN",
      "TTL": "300 (5 mins)",
      "RDLENGTH": "90 bytes",
      "RDATA": {
        "TypeCovered": "CNAME",
        "Algorithm": "ECDSAP256SHA256",
        "Labels": 3,
        "OriginalTtl": 300,
        "SignatureExpiration": "2024-03-26T21:48:00Z",
        "SignatureInception": "2024-03-24T19:48:00Z",
        "KeyTag": 34505,
        "SignersName": "cl4.es",
        "Signature": "Y6axjJXemx3FcJdjlgUvg6J47q784+cSnxRU3J11JLivdUZxa4r49pFi19B7xud2SaqCF+xGCxhl57Cv++sbKQ=="
      },
      "DnssecStatus": "Secure"
    },
    {
      "Name": "oc0.oc.cl4.es",
      "Type": "A",
      "Class": "IN",
      "TTL": "300 (5 mins)",
      "RDLENGTH": "4 bytes",
      "RDATA": {
        "IPAddress": "129.151.70.133"
      },
      "DnssecStatus": "Secure"
    },
    {
      "Name": "oc0.oc.cl4.es",
      "Type": "RRSIG",
      "Class": "IN",
      "TTL": "300 (5 mins)",
      "RDLENGTH": "90 bytes",
      "RDATA": {
        "TypeCovered": "A",
        "Algorithm": "ECDSAP256SHA256",
        "Labels": 4,
        "OriginalTtl": 300,
        "SignatureExpiration": "2024-03-26T21:48:00Z",
        "SignatureInception": "2024-03-24T19:48:00Z",
        "KeyTag": 34505,
        "SignersName": "cl4.es",
        "Signature": "vqd1lWuXQtKBE+orqZxSy2QtaWpttFsizEUAdjlbyc/MYqmGYjujnDmCUtV61bHPLie/J2ebPdhiKE2oeJDeew=="
      },
      "DnssecStatus": "Secure"
    }
  ],
  "Authority": [],
  "Additional": [
    {
      "Name": "",
      "Type": "OPT",
      "Class": "1232",
      "TTL": "32768 (9 hours 6 mins 8 sec)",
      "RDLENGTH": "308 bytes",
      "RDATA": {
        "Options": [
          {
            "Code": "PADDING",
            "Length": "304 bytes",
            "Data": {
              "Data": "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=="
            }
          }
        ]
      },
      "DnssecStatus": "Indeterminate"
    }
  ]
}
@ShreyasZare
Copy link
Member

Thanks for the feedback. I have observed during some testing that on rare occasions, Cloudflare DNS returns a response without the necessary RRSIG records that are needed to validate the response. When you retry again then you will get back the needed RRSIG. So, it may cause a one-off case like you observed.

The case with DNS server is that such a response causes validation failure (RRSIG Missing) and gets cached as a failure (negative) answer for a few seconds. If the same domain is queried again and the cache expires, the DNS server will retry again but till then it will answer from cache. Also, if the cache contains a valid answer which is expired, it wont be overwritten by failure answer. Which is why in your tests you get SignatureExpired and the Extended DNS Error says its a StaleAnswer. And since its stale with the RRSIG record in there past its expiry, its causing the DNSSEC validation check done by the DNS Client to fail.

Since, the domain's RRSIG records are valid only for 2 days in this case, the issue here is noticed. If they had configured the RRSIG with say a 7 days expiry then you would not have noticed this issue at all since the stale answer in the cache would have been valid.

If the issue is frequent and is bothering you, try to remove Cloudflare from your forwarders and just keep Quad9 and observe if this issue repeats.

@claudio4
Copy link
Author

Thank you for the comprehensive response. I have now removed Cloudflare DNS from my forwarders list and will follow up in a few days to report whether this resolves the issue.

If the issue lies with Cloudflare's DNS, it would be wise to report it on the Cloudflare forums. Should I post it or do you prefer to do so yourself? In the case of the former, is there any extra detail that I should place in the forum post?

@ShreyasZare
Copy link
Member

If the issue lies with Cloudflare's DNS, it would be wise to report it on the Cloudflare forums. Should I post it or do you prefer to do so yourself? In the case of the former, is there any extra detail that I should place in the forum post?

This issue of missing RRSIG record is not reproducible. It happens very rarely and retrying it makes it go away. So not sure how this can be demonstrated to them to be taken seriously.

@claudio4
Copy link
Author

claudio4 commented Mar 30, 2024

After a few days of operating the DNS Server without CF in the forwarder list, I must regrettably confirm that the issue persists, occurring at the same frequency as before, approximately 25 times per day.

Upon a more detailed examination of the logs, I've observed that a domain which encounters this issue once is likely to experience it again, whereas most other domains will not. The distinguishing factor is unclear, but it appears that something within those particular domains irritates the DNS Server. Below is a list of domains identified so far that have triggered this issue:

  • webanalytics.europa.eu
  • auth.eldiario.es
  • www.eldiario.es
  • static.eldiario.es
  • crl.verisign.com
  • mt-proxy.cl4.es
  • ocsp.pki.goog
  • app.posthog.com
  • ts3.bytetime.net
  • www.ikea.com
  • web-api.ikea.com
  • api.ingka.ikea.com
  • icsp.ingka.ikea.com
  • rec.ingka.com
  • `docs.gimp.org
  • www.schemastore.org
  • www.paypal.com
  • consent.cookiebot.com
  • consentcdn.cookiebot.com
  • imgsct.cookiebot.com
  • www.paypalobjects.com
  • ppo.glb.paypal.com
  • t.paypal.com
  • www.glb.paypal.com
  • auth.mangadex.org
  • api.mangadex.org
  • codecs.opensuse.org
  • download.technitium.com

I am willing to share my full server logs if they are of any help to you, although I will prefer to do this through a private channel, as I am not to kind of the idea of it being public on the Internet.


This issue of missing RRSIG record is not reproducible. It happens very rarely and retrying it makes it go away. So not sure how this can be demonstrated to them to be taken seriously.

I see, nothing to do in this front then.

@ShreyasZare
Copy link
Member

Thanks for the analysis and details. Will try to see how this issue can be mitigated.

@fbayerx
Copy link

fbayerx commented Apr 8, 2024

First of all: Thanks for the amazing work, this is the first issue I ran into, other than this everything has been flawless!

I observed the same issue with www.paypal.com and www.portainer.io in the last days and I'm able to reproduce the issue with at least some of the domains listed above by claudio4.
I have DNSSEC enabled in the technitium settings and use dns.quad9.net (DNS-over-TLS) as Forwarder. I run technitium in a docker container from technitium/dns-server:latest.
If you need any additional information, or if there is something to test, just let me know.

@ShreyasZare
Copy link
Member

First of all: Thanks for the amazing work, this is the first issue I ran into, other than this everything has been flawless!

I observed the same issue with www.paypal.com and www.portainer.io in the last days and I'm able to reproduce the issue with at least some of the domains listed above by claudio4. I have DNSSEC enabled in the technitium settings and use dns.quad9.net (DNS-over-TLS) as Forwarder. I run technitium in a docker container from technitium/dns-server:latest. If you need any additional information, or if there is something to test, just let me know.

Thanks for the feedback. Will add mitigations to fix this issue.

@mocollin
Copy link

I also have issues with DNSSEC in 12.1. When enabled, using Quad9 as forwarder (also tried cloudflare), I frequently cannot resolve paypal.com. I've had to disable DNSSEC with 12.1

@axelgenus
Copy link

Another Quad9 user here experiencing this issue. I use Quad9 DNS-over-TLS (secured) as resolver. It fail resolving formulae.brew.sh in my case which means Homebrew completely unusable.

@ShreyasZare
Copy link
Member

I also have issues with DNSSEC in 12.1. When enabled, using Quad9 as forwarder (also tried cloudflare), I frequently cannot resolve paypal.com. I've had to disable DNSSEC with 12.1

Thanks for the feedback. Can you share the output from DNS Client to know if its same issue or something different. Also, were you using encrypted DNS protocol with Quad9?

@ShreyasZare
Copy link
Member

Another Quad9 user here experiencing this issue. I use Quad9 DNS-over-TLS (secured) as resolver. It fail resolving formulae.brew.sh in my case which means Homebrew completely unusable.

Thanks for the feedback. Can you share the output from DNS Client to know if its same issue or something different?

@axelgenus
Copy link

Thanks for the feedback. Can you share the output from DNS Client to know if its same issue or something different?

Sure, here is for another domain but the log is full of these exceptions:

[2024-04-15 05:49:07 UTC] DNS Server failed to resolve the request 'ocsp.pki.goog. AAAA IN' using forwarders: dns.quad9.net:853 ([2620:fe::fe]), dns.quad9.net:853 ([2620:fe::9]).

TechnitiumLibrary.Net.Dns.DnsClientResponseDnssecValidationException: DNSSEC validation failed due to missing DS records for owner name: ocsp.pki.goog
   at TechnitiumLibrary.Net.Dns.DnsClient.GetDSForAsync(String ownerName, DnsClass class, IReadOnlyList`1 currentDnsKeyRecords, DnsClient dnsClient, IDnsCache cache, UInt16 udpPayloadSize, DnsDatagram originalResponse, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 3222
   at TechnitiumLibrary.Net.Dns.DnsClient.FindDnsKeyForAsync(String ownerName, DnsClass class, IReadOnlyList`1 currentDnsKeyRecords, DnsClient dnsClient, IDnsCache cache, UInt16 udpPayloadSize, DnsDatagram originalResponse, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 3001
   at TechnitiumLibrary.Net.Dns.DnsClient.DnssecValidateResponseAsync(DnsDatagram response, IReadOnlyList`1 lastDSRecords, DnsClient dnsClient, IDnsCache cache, UInt16 udpPayloadSize, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 2535
   at TechnitiumLibrary.Net.Dns.DnsClient.InternalDnssecResolveAsync(DnsQuestionRecord question, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4692
   at TechnitiumLibrary.Net.Dns.DnsClient.<>c__DisplayClass91_0.<<InternalCachedResolveQueryAsync>b__0>d.MoveNext() in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4754
--- End of stack trace from previous location ---
   at TechnitiumLibrary.Net.Dns.DnsClient.ResolveQueryAsync(DnsQuestionRecord question, Func`2 resolveAsync) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4103
   at TechnitiumLibrary.Net.Dns.DnsClient.InternalCachedResolveQueryAsync(DnsQuestionRecord question, CancellationToken cancellationToken) in Z:\Technitium\Projects\TechnitiumLibrary\TechnitiumLibrary.Net\Dns\DnsClient.cs:line 4736
   at DnsServerCore.Dns.DnsServer.RecursiveResolveAsync(DnsQuestionRecord question, NetworkAddress eDnsClientSubnet, Boolean advancedForwardingClientSubnet, IReadOnlyList`1 conditionalForwarders, Boolean dnssecValidation, Boolean cachePrefetchOperation, Boolean cacheRefreshOperation, Boolean skipDnsAppAuthoritativeRequestHandlers, TaskCompletionSource`1 taskCompletionSource) in Z:\Technitium\Projects\DnsServer\DnsServerCore\Dns\DnsServer.cs:line 3193

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants