Skip to main content
Skip table of contents

3616 - Troubleshooting DNSSEC in NIOS

Scenario

You have started as a new DNS administrator at a coffee company. The internal name space includes an authoritative zone coffee.corp on the server NS1 (10.100.0.111) and a delegated zone zone kona.coffee.corp on server NS2 (10.100.0.222). Users have reported some behaviors that leads them to suspect the delegation is not configured correctly. Please use your DNS knowledge to troubleshoot, locate the root cause(s), and make suggestions to the users.

Estimate Completion Time

  • 45 to 60 Minutes

Credentials

Description

Username

Password

URL or IP

Grid Manager UI

admin

infoblox

https://10.100.0.100/

Course References

  • 2009: Configuring NIOS DNS Services

  • 2023: Configuring NIOS DNS Zones

  • 3011: DNS Troubleshooting Methodology

Lab Initiation

Access jump-desktop

Once the lab is deployed, you can access the virtual machines required to complete this lab activity. To initiate the lab, click on the jump-desktop tile and login to the Linux UI:

Username: training

Password: infoblox

Initiate lab

To initiate the lab, double-click the Launch Lab icon on the Desktop.

Launch Lab

Launch Lab

Choose the lab number from the list and click OK.

After clicking OK, you will see a pop-up message with a brief description of the lab task. If the description looks correct, click Yes to continue lab initiation.

Lab initiation will take a couple of minutes to finish.

Once complete, you will see another pop-up message with the login credentials and the URL for the Grid Manager’s User Interface. Note that the credentials may differ from those from prior labs.

Screenshot 2024-05-06 at 3.16.57 PM.png

Tasks

Task 1: First Ticket

User reports that he is unable to resolve a domain name, with a screenshot attached. Please investigate the root cause.

Look at the spelling

Task 2: Second Ticket

User is still unable to resolve "sweet.kona.coffee.corp", and provided screenshot, investigate the root cause.

Task 3: Verify Delegated Resolution

You have learned that there is a third DNS server dedicated to perform recursive lookups. The server is ADA (10.100.0.100). Please use this server to resolve the delegated name and observe its behavior. On the jump-Desktop Command line, execute the following command:

dig @10.100.0.100 sweet.kona.coffee.corp. A

What IPv4 address does the name resolve to?

Task 4: Analyze and Recommend

Please analyze the settings and configurations on all 3 DNS servers: ADA (10.100.0.100), NS1 (10.100.0.111), and NS2 (10.100.0.222). Should the user who reported the issue continue to use NS1 (10.100.0.100) to resolve delegated names such as sweet.kona.coffee.corp? Why or why not?

It is useful to draw a diagram as you analyze each DNS server configuration, to visualize how each server is related.




Solutions

Task 1 solution: First Ticket

Root Cause

Misspelled domain name sweet.kona.coffee.crop., should be corp.

Detailed Analysis

The root cause is the name was misspelled.
The name server NS1 (10.100.0.111) is not authoritative for the coffee.crop domain name, and must resolve it using recursion. Since recursion is not enabled on the server NS1 (10.100.0.111), we receive the REFUSED response code. The clue can be seen in a line below the header section that reads:

WARNING: recursion requested but not available

Task 2 solution: Second Ticket

Root Cause

Client should not be using authoritative server to resolve delegated domain name. Point to 10.100.0.100 instead.

Detailed Analysis

The response is known as a REFERRAL in DNS, although it is not its own type of return code. This is normal behavior from authoritative name server, in response to a query that asks for a name that has been delegated. The authoritative name server NS1 (10.100.0.111) sends back the response that contains the NS record and the glue record, informing the client to query NS2 (10.100.0.222). At this point the client (desktop) is expected to perform a follow-up iterative query to NS2 (10.100.0.222), to "chase down the answer".

The proper solution is to introduce a recursive name server for the client to use, to perform all of the iterative queries to chase down the answer on behalf of the client.

While it is possible to simply enable recursion on the authoritative server NS1 (10.100.0.111), it is not the best practice. If possible, separate the roles of your DNS servers, so that authoritative servers only serve authoritative data, and another server is dedicated to performing recursive lookups. This is especially important if you wish to use DNSSEC, which requires this role separation.

Task 3 solution: Verify Delegated Resolution

Root Cause

No errors in this task, we are continuing our investigation from the previous one.

Detailed Analysis

Using the recursive server ADA (10.100.0.100) you are able to resolve the name sweet.kona.coffee.corp, it resolves to the IPv4 addrress 10.3.3.3.




Task 4 solution: Analyze and Recommend

Root Cause

The root cause for our users encountering DNS resolutions is because they are querying the authoritative server NS1 (10.100.0.111) who is not providing recursion. Users should query recursive resolver or recursive servers instead.

Detailed Analysis

After analyze the configurations on each DNS server, you should have a diagram like the one below showing how they related to one another. In this environment, both NS1 and NS2 are authoritative only, no recursion is available. This is considered best practice, to separate DNS server roles (authoritative and recursive). The server ADA is providing the recursive service. It is acting like a traffic cop, sending queries ending in coffee.corp to NS1, and the rest of the queries to the Internet. The behavior we observed in Task 2 is what happens when clients query authoritative servers directly: the DNS server sends back a REFERRAL, but clients are unable to follow the REFERRAL. 

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.