Estou tentando encontrar a origem de um erro do qual não posso me livrar no depurador dnssec do verisign
Depurador da Verisign
Dig consulta o servidor bem
dig ex-mailer.com ANY @108.61.190.64
Todos os meus logs estão limpos e sem erros no modo de depuração Saída de log
Na verdade, o único sinal de algo errado está em uma captura de pacotes com o que parece ser fragmentação excessiva
OMTUnaminhaplacaderedeéde1500
vtnet0:flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST>metric0mtu1500options=6c03bb<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,TSO4,TSO6,VLAN_HWTSO,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>ether56:00:00:05:53:09inet62001:19f0:6c00:8141::64prefixlen64inet6fe80::5400:ff:fe05:5309%vtnet0prefixlen64scopeid0x1inet108.61.190.64netmask0xffffff00broadcast108.61.190.255nd6options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>media:Ethernet10Gbase-T<full-duplex>status:active
masopmtuparecesurpreso:
ping-s1500-Mdo108.61.190.64From192.168.0.68:icmp_seq=1FragneededandDFset(mtu=1490)From192.168.0.68:icmp_seq=1FragneededandDFset(mtu=1490)From192.168.0.68:icmp_seq=1FragneededandDFset(mtu=1490)From192.168.0.68:icmp_seq=1FragneededandDFset(mtu=1490)From192.168.0.68:icmp_seq=1FragneededandDFset(mtu=1490)
Nãoseiondemaisprocurar.TenhocertezadequeessafragmentaçãodeMTUéaorigemdoerro.
ComopossomelivrardesseerrodeDNSverisign?
masterconfig:
acl"trusted" {
108.61.190.64;
107.191.60.48;
2001:19f0:7000:8945::64;
2001:19f0:6c00:8141::64;
108.61.10.10;
127.0.0.1/32;
::1/128;
};
acl "outside" {
any;
};
options {
directory "/usr/local/etc/namedb/working/";
pid-file "/var/run/named/named.pid";
dnssec-enable yes;
dnssec-validation auto;
dnssec-lookaside auto;
listen-on-v6 { ::1; 2001:19f0:6c00:8141::64;};
listen-on { 127.0.0.1; 108.61.190.64;};
max-cache-ttl 1600;
version none;
auth-nxdomain no; # conform to RFC1035
allow-recursion-on { any; };
allow-recursion{ any; };
allow-query-cache-on{ any; };
allow-query-on{ any; };
allow-update-forwarding{ any; };
allow-query {
any;
};
allow-query-cache {
any;
};
allow-transfer {
any;
};
//forward first;
forwarders {
108.61.10.10;
108.61.190.64;
107.191.60.48;
};
};
logging {
category default { default_log; };
category queries { resolver_file; };
channel default_log {
file "/var/log/named/named.log" versions 5 size 50M;
print-time yes;
print-severity yes;
print-category yes;
severity debug;
};
channel resolver_file {
file "/var/log/named/resolver.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel xfer-in_file {
file "/var/log/named/xfer-in.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
category default { default_log; };
category general { default_log; };
};
#include "/usr/local/etc/namedb/rndc.key";
controls {
inet * port 953 allow { 127.0.0.1/32; ::1/128; 107.191.60.48; 108.61.190.64;} keys {"rndc-key"; };
};
key "rndc-key" {
algorithm hmac-md5;
secret "KcnxhOeXddg8dRNrn9Qfew==";
};
view "external" {
match-clients { any; };
match-destinations { any; };
recursion yes;
allow-query { any; };
zone "." IN {
type hint;
file "/usr/local/etc/namedb/named.root";
};
zone "ex-mailer.com" {
type master;
allow-transfer { trusted; };
also-notify { 108.61.190.64; };
update-policy local;
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/ex-mailer.com.external.signed";
};
zone "nyctelecomm.com" {
type master;
#allow-transfer {107.191.60.48;};
also-notify {107.191.60.48;};
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/nyctelecomm.com.external.signed";
};
zone "emailingu.com" {
type master;
update-policy local;
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/emailingu.com.external.signed";
};
zone "instaknowit.com" {
type master;
update-policy local;
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/instaknowit.com.external";
};
zone "zippy-mail.com" {
type master;
update-policy local;
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/zippy-mail.com.external.signed";
};
zone "190.61.108.in-addr.arpa"{
type master;
file "/usr/local/etc/namedb/reverse.external";
};
zone "127.in-addr.arpa" {
type master;
file "/usr/local/etc/namedb/127.0.0.1";
};
};
configuração do escravo:
acl "trusted" {
108.61.190.64;
107.191.60.48;
2001:19f0:7000:8945::64;
2001:19f0:6c00:8141::64;
108.61.10.10;
127.0.0.1/32;
::1/128;
};
acl "outside" {
any;
};
options {
directory "/usr/local/etc/namedb/working/";
pid-file "/var/run/named/named.pid";
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
auth-nxdomain no;
listen-on-v6 { ::1; 2001:19f0:7000:8945::64;};
listen-on { 127.0.0.1; 107.191.60.48;};
max-cache-ttl 1600;
version none;
notify yes;
also-notify { 108.61.190.64; };
allow-notify { 107.191.60.48; };
allow-recursion { any; };
allow-recursion-on { any; };
allow-query-cache-on{ any; };
allow-query-on{ any; };
allow-update-forwarding{ any; };
allow-transfer { any; };
allow-query {
any;
};
allow-query-cache {
any;
};
allow-update {
trusted;
};
//forward first;
forwarders {
108.61.10.10;
108.61.190.64;
107.191.60.48;
};
};
logging {
category default { default_log; };
category queries { resolver_file; };
channel default_log {
file "/var/log/named/named.log" versions 5 size 50M;
print-time yes;
print-severity yes;
print-category yes;
severity debug;
};
channel general_file {
file "/var/log/named/general.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel config_file {
file "/var/log/named/config.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel resolver_file {
file "/var/log/named/resolver.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel xfer-in_file {
file "/var/log/named/xfer-in.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
category default { default_log; };
category general { default_log; };
};
#include "/usr/local/etc/namedb/rndc.key";
controls {
inet * port 953 allow { 127.0.0.1/32; ::1/128; 108.61.190.64; 107.191.60.48; } keys {"rndc-key"; };
};
key "rndc-key" {
algorithm hmac-md5;
secret "N/SB9HZwr5yRIBwtRjcA6A==";
};
view "external" {
match-clients { outside; };
match-destinations { outside; };
recursion yes;
allow-recursion { any; };
allow-query { outside; };
zone "." IN {
type hint;
file "/usr/local/etc/namedb/named.root";
};
#include "/usr/local/etc/namedb/tmp/zonelist.db";
zone "nyctelecomm.com" {
type slave;
masters {108.61.190.64;};
allow-notify { trusted; };
allow-transfer { any; };
notify yes;
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/nyctelecomm.com.external.signed";
};
zone "ex-mailer.com" {
type slave;
masters {108.61.190.64; };
#transfer-source { 108.61.190.64; };
allow-notify{ trusted; };
notify yes;
allow-transfer { any; };
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/ex-mailer.com.external.signed";
};
zone "emailingu.com" {
masters {108.61.190.64; };
type slave;
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/emailingu.com.external.signed";
};
zone "zippy-mail.com" {
type slave;
masters {108.61.190.64; };
auto-dnssec allow;
key-directory "/usr/local/etc/namedb/";
file "/usr/local/etc/namedb/zippy-mail.com.external.signed";
};
zone "190.61.108.in-addr.arpa"{
type master;
allow-update {none;};
file "/usr/local/etc/namedb/reverse.external";
};
zone "127.in-addr.arpa" {
type master;
allow-update {none;};
file "/usr/local/etc/namedb/127.0.0.1";
};
};