.tn TLD DNSSEC Outage: 2019-09-09 to 2019-09-11

Date: September 9 to September 11, 2019

Overview

This page gives some details on the .tn (Tunisia) TLD DNSSEC outage from September 9 to September 11, 2019.

Timeline / DNSViz

(At the time of this writing, DNSViz historical archives have been down for months. DNSSEC makes its users think downtime doesn't matter.)

Since DNSViz no longer saves DNSSEC outage info, there is an archive at archive.is.

DNSSEC Debugger

Here's a screenshot of my web browser's output from September 9, 2019:

Sept. 9, 2019 .tn (Tunisia) TLD DNSSEC outage

There is a copy of DNSSEC Debugger output saved by archive.is.

Google DNS: with and without DNSSEC

DNSSEC can be disabled in queries via the CD (checking disabled) bit. Let's compare DNS queries with and without DNSSEC.

$ dig +dnssec ns tn. @8.8.8.8

; <<>> DiG 9.4.2-P2 <<>> +dnssec ns tn. @8.8.8.8
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 11270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 512
;; QUESTION SECTION:
;tn. IN NS

;; Query time: 31 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Mon Sep 9 11:27:27 2019
;; MSG SIZE rcvd: 31


You have to disable DNSSEC to make DNS queries work:

$ dig +cd ns tn. @8.8.8.8

; <<>> DiG 9.4.2-P2 <<>> +cd ns tn. @8.8.8.8
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 299
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;tn. IN NS

;; ANSWER SECTION:
tn. 21599 IN NS pch.ati.tn.
tn. 21599 IN NS ns1.ati.tn.
tn. 21599 IN NS ns2.ati.tn.
tn. 21599 IN NS ns2.nic.fr.
tn. 21599 IN NS ns-tn.afrinic.net.
tn. 21599 IN NS rip.psg.com.

;; Query time: 18 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Mon Sep 9 11:27:27 2019
;; MSG SIZE rcvd: 158

Zonemaster

drill trace

Since DNSSEC contains so much garbage, I put the complete drill trace into its own file, with the relevant portion below (emphasis added):

;; Domain: tn.
[T] tn. 86400 IN DNSKEY 256 3 8 ;{id = 36171 (zsk), size = 2048b}
tn. 86400 IN DNSKEY 257 3 8 ;{id = 8629 (ksk), size = 2048b}
[U] No data found for: tn. type A
;;[S] self sig OK; [B] bogus; [T] trusted

Since DNSSEC is weird and confusing, the above feels right, but it's wrong. Here is what the output is supposed to look like (the below was taken after the outage):

;; Domain: tn.
[T] tn. 86400 IN DNSKEY 257 3 8 ;{id = 8629 (ksk), size = 2048b}
tn. 86400 IN DNSKEY 256 3 8 ;{id = 36171 (zsk), size = 2048b}
[T] Existence denied: tn. A
;;[S] self sig OK; [B] bogus; [T] trusted

Logfile examples

These Unbound log entries come from different Unbound instances, each on different servers in different geographical regions.