lsu.edu DNSSEC Outage: 2019-02-28
Date: February 28, 2019
Overview
This page gives some details on the lsu.edu (Louisiana State University) DNSSEC outage on February 28, 2019. LSU has over 30,000 students.
Timeline / DNSViz
DNSViz is at the time of this writing having a multi-week outage related to hardware being shipped to another location. The downtime was only supposed to take a week or so, but persists. I contend that DNSSEC proponents become numb to outages, which spreads to other areas of their work, so that multiple weeks of outage just seems normal and isn't urgent at all.
- 2019-02-28 06:20:30 UTC — first personally observed DNSSEC failure
- 2019-02-28 18:00:49 UTC — last personally observed DNSSEC failure
DNSSEC Debugger
Unlike DNSViz, Verisign's DNSSEC Debugger doesn't archive results, so here's a screenshot of my web browser's output from February 28, 2019:

Zonemaster
Note: Zonemaster requires javascript.
- zonemaster.labs.nic.cz archived "No DS record had a DNSKEY with a matching keytag."
- zonemaster.iis.se archived "No DS record had a DNSKEY with a matching keytag."
Google Public DNS: with and without DNSSEC
DNSSEC can be disabled in queries via the CD (checking disabled) bit. Let's compare DNS queries with and without DNSSEC.
With DNSSEC, DNS queries fail:
$ dig +dnssec mx lsu.edu. @8.8.8.8
; <<>> DiG 9.4.2-P2 <<>> +dnssec mx lsu.edu. @8.8.8.8
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 39501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 512
;; QUESTION SECTION:
;lsu.edu. IN MX
;; Query time: 155 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Thu Feb 28 06:20:36 2019
;; MSG SIZE rcvd: 36
You have to disable DNSSEC to make DNS queries work:
$ dig +cd mx lsu.edu. @8.8.8.8
; <<>> DiG 9.4.2-P2 <<>> +cd mx lsu.edu. @8.8.8.8
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27474
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;lsu.edu. IN MX
;; ANSWER SECTION:
lsu.edu. 1131 IN MX 0 lsu-edu.mail.protection.outlook.com.
;; Query time: 8 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Thu Feb 28 06:20:36 2019
;; MSG SIZE rcvd: 76
drill trace
Since DNSSEC contains so much garbage, I put the complete drill trace into its own file, with the relevant portion below (emphasis added):
;; Domain: lsu.edu.
;; Signature ok but no chain to a trusted key or ds record
[S] lsu.edu. 7200 IN DNSKEY 256 3 5 ;{id = 36310 (zsk), size = 1024b}
lsu.edu. 7200 IN DNSKEY 257 3 5 ;{id = 23638 (ksk), size = 2048b}
[S] lsu.edu. 7200 IN A 130.39.6.220
;;[S] self sig OK; [B] bogus; [T] trusted
Logfile examples
- [1551334830] unbound[56449:0] info: validation failure <lsu.edu. A IN>: no keys have a DS with algorithm RSASHA1 from 192.16.176.87 for key lsu.edu. while building chain of trust
- [1551376849] unbound[56449:0] info: validation failure <lsu.edu. A IN>: no keys have a DS with algorithm RSASHA1 from 192.16.176.87 for key lsu.edu. while building chain of trust