Thanks to CF Resolver we the see Extended DNS Errors in the reponse.This helps identify DNSSEC issues quickly.
During a regular i noticed when querying the SOA for the Label at (TLD of Austria) theres an
;; EDE: 10 (RRSIGs Missing): ‘for DNSKEY at., id = 1253’
included.
kdig @1.1.1.1 at +edns +dnssec
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 2935
;; Flags: qr rd ra ad; QUERY: 1; ANSWER: 0; AUTHORITY: 4; ADDITIONAL: 1
;; EDNS PSEUDOSECTION:
;; Version: 0; flags: do; UDP size: 1232 B; ext-rcode: NOERROR
;; EDE: 10 (RRSIGs Missing): 'for DNSKEY at., id = 1253'
;; QUESTION SECTION:
;; at. IN A
;; AUTHORITY SECTION:
at. 10800 IN SOA dns.nic.at. domain-admin.univie.ac.at. 1692212402 10800 3600 604800 10800
at. 10800 IN RRSIG SOA 13 1 172800 20230830114054 20230816180140 6345 at. E7KC8G+yvUfWnm/vaNIpXCpCraegPld80mliWZnMfsp/ImP4dHgVN9vR/O70Mp2OEv4wxPQ4dMsGuXtjZq2Ngw==
fjscbioio98ccv4od6ka4d7oh5bgrn00.at. 10800 IN NSEC3 1 1 0 - fjsgctda26f5nr1uo17l5me78mc61hq3 NS SOA RRSIG DNSKEY NSEC3PARAM
fjscbioio98ccv4od6ka4d7oh5bgrn00.at. 10800 IN RRSIG NSEC3 13 2 10800 20230827103411 20230813220146 6345 at. cssVj+Ia0n1grvudBjp7cg9OuQB/QZP6RhYbbDf0yakmzXji+okKgG4at2ynb/j/zsgFdtN9RJcs9YEVY9TEUA==
;; Received 405 B
;; Time 2023-08-16 21:09:44 CEST
;; From 1.1.1.1@53(UDP) in 14.8 ms
Query some of the TLD-Rootservers contains the DNSKEY with the key tag 1253 and a (valid) Signature of the Response.
kdig @u.ns.at at dnskey +edns +dnssec +multiline
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 34186
;; Flags: qr aa rd; QUERY: 1; ANSWER: 5; AUTHORITY: 0; ADDITIONAL: 1
;; EDNS PSEUDOSECTION:
;; Version: 0; flags: do; UDP size: 1400 B; ext-rcode: NOERROR
;; QUESTION SECTION:
;; at. IN DNSKEY
;; ANSWER SECTION:
at. 3600 IN DNSKEY 256 3 13 (
afqJ2CAlm26vL9vdgWZlvBp1BhCXAvXGPDf96ykT
8cf7i7uir4QQA5mLi9wikE4WnvD6Y8S9mU4f3SUg
maQOEA==
) ; ZSK, ECDSAP256SHA256 (256b), id = 6345
at. 3600 IN DNSKEY 257 3 13 (
F4hxGBIycDfw7ZIeJ1bkOjeGibnoNdlJ9siahr/G
PYh9sIftAPCNOSiypWUnNeKu9zHpFY+HtzzPgbZm
LO1VRQ==
) ; KSK, ECDSAP256SHA256 (256b), id = 18942
at. 3600 IN DNSKEY 257 3 13 (
2JRF0JhWxU1FWmhF7eY9oPu4XkUdqPDVNi3tm6uX
J9DxltWjAS2JMBdAmm6ehsMdlsvsMV+cz+7DZGMz
NhbX1g==
) ; KSK, ECDSAP256SHA256 (256b), id = 1253
at. 3600 IN DNSKEY 256 3 13 (
Yye3yFQfyzze/CB9a+89JY/Zyf7L9gEXx9dI72oH
yNU1mrMXdKU69LXiNAl9xnW+7BEFjO2NaxoI+h3F
4tsF/A==
) ; ZSK, ECDSAP256SHA256 (256b), id = 8460
at. 3600 IN RRSIG DNSKEY 13 1 3600 20230825065223 (
20230811100145 18942 at.
7okFniGJjFQn9lJHj2geedF4KcjDpSv6mbd0itS0
xgC1CCP9T04mmE9fHsSL8XYzBRB/mESQcbJoRMcu
ge3CKw==
)
;; Received 449 B
;; Time 2023-08-16 21:15:00 CEST
;; From 2a02:850:ffff::2@53(UDP) in 17.6 ms
There is certainly an explanation for this. What could be a reason? Failed fetching of the DNSKEY from authoritative Nameserver for at (network issues)?