.kg TLD DNSSEC Outage: 2019-01-01
Updated: January 2, 2019
Overview
This page gives some details on the kg (Kyrgyzstan) TLD DNSSEC outage on January 1, 2019.
Timeline / DNSViz
- 2018-12-31 23:59:59 UTC — RRSIGs expire
- 2019-01-01 00:00:46 UTC — expired RRSIGs
- 2019-01-01 00:01:27 UTC — expired RRSIGs
- 2019-01-01 00:04:58 UTC — expired RRSIGs
- 2019-01-01 01:07:51 UTC — expired RRSIGs
- 2019-01-01 09:15:29 UTC — last personally observed DNSSEC failure
Verisign's DNSSEC Debugger
Here's a screenshot I took on January 1, 2019, of the DNSSEC Debugger output:
Google Public DNS: with and without DNSSEC
DNSSEC can be disabled in queries via the CD (checking disabled) bit. Let's compare DNS queries with and without DNSSEC. With DNSSEC, DNS queries result in SERVFAIL:
$ dig +dnssec ns kg. @8.8.8.8
; <<>> DiG 9.4.2-P2 <<>> +dnssec ns kg. @8.8.8.8
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 51648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 512
;; QUESTION SECTION:
;kg. IN NS
;; Query time: 375 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Tue Jan 1 00:01:18 2019
;; MSG SIZE rcvd: 31
You have to disable DNSSEC to make DNS queries work:
$ dig +cd ns kg. @8.8.8.8
; <<>> DiG 9.4.2-P2 <<>> +cd ns kg. @8.8.8.8
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49148
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;kg. IN NS
;; ANSWER SECTION:
kg. 3097 IN NS as.asiainfo.kg.
kg. 3097 IN NS kg.cctld.authdns.ripe.net.
kg. 3097 IN NS ns.kg.
;; Query time: 9 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Tue Jan 1 00:01:18 2019
;; MSG SIZE rcvd: 102
Zonemaster
Note: zonemaster requires javascript.
- zonemaster.net archived "No DNSKEYs were returned."
- zonemaster.fr archived "No DNSKEYs were returned."
drill trace
Since DNSSEC contains so much garbage, I put the complete drill trace into its own file with the relevant portion below (emphasis added):
;; Domain: kg.
[B] kg. 86400 IN DNSKEY 256 3 5 ;{id = 49950 (zsk), size = 1024b}
kg. 86400 IN DNSKEY 257 3 5 ;{id = 49954 (ksk), size = 1024b}
[B] Error verifying denial of existence for kg. type A: No keys with the keytag and algorithm from the RRSIG found
;;[S] self sig OK; [B] bogus; [T] trusted
Logfile examples
- [1546300873] unbound[93234:0] info: validation failure <kg. NS IN>: signature expired from 193.0.9.84 for key kg. while building chain of trust
- [1546306889] unbound[93234:0] info: validation failure <uptime.kg. A IN>: signature expired from 193.0.9.84 for key kg. while building chain of trust