Self sign-up has been disabled due to increased spam activity. If you want to get access, please send an email to a project owner (preferred) or at gitlab(at)nic(dot)cz. We apologize for the inconvenience.
Domain spam.molax.co.kr. qtype A does not work with EDNS. Auth servers correctly return FORMERR but kresd 5.2.0 does not fallback to non-EDNS and SERVFAILs request from client.
Interestingly the server responds with FORMERR only to the first query and then is silent. This can be reproduced manually by running dig @211.105.253.20 molax.co.kr. NS. It seems like heavy rate limiting or blacklist triggered by repeated FORMERRs.
At least we can think about some optimization, possibly as part of !1030 (merged) . @sbalazik Please have a look at the PCAP, it has very wild retransmits in it (times in the table are relative to the previous row):
In what version of kresd is this supposed to be fixed? I am seeing what looks like the same behaviour described here against domain nextwebhosting.com on 5.4.1. The delegated servers reply FORMERR to EDNS0 queries. kresd tries both delegated servers once, with EDNS0, receives FORMERR for both queries, and then sends SERVFAIL to the client. The trace does indicate that kresd detects FORMERR_EDNS, but doesn't seem to act on it.
The workaround policy.add(policy.suffix(policy.FLAGS({'NO_EDNS'}), {todname('nextwebhosting.com.')})) works.
@ktims: nextwebhosting.com seems clearly wrong here, I'm sorry. FORMERR is only standardized to indicate non-support of EDNS0 if the reply does not contain EDNS0 section (i.e. the OPT record). That is not the case:
$ kdig @216.19.65.2 nextwebhosting.com +edns;; ->>HEADER<<- opcode: QUERY; status: FORMERR; id: 8102;; Flags: qr rd; QUERY: 1; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 1;; EDNS PSEUDOSECTION:;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR;; QUESTION SECTION:;; nextwebhosting.com. IN A;; Received 47 B;; Time 2021-10-11 13:02:33 CEST;; From 216.19.65.2@53(UDP) in 118.4 ms