-
xmrfn
I got this warning upon starting monerod v18.0 ; did not get any DNS warnings on v17.3.2:
-
xmrfn
"WARNING net.dns src/common/dns_utils.cpp:346 Invalid DNSSEC TXT record signature for updates.moneropulse.org: validation failure <updates.moneropulse.org. TXT IN>: SERVFAIL no DS for DS org. while building chain of trust"
-
xmrfn
From StackExchange, I think i grok what moneropulse is. I have DNS checkpointing disabled in monerod because I use it for p2pool mining
-
moneromooo
OMG, this is a telltale indication of NSA active attack on you!
-
xmrfn
TY moo
-
moneromooo
Oh wait. I'm wrong. Hopefully.
-
xmrfn
lol
-
xmrfn
Just wondering if moneropuls needs to update their record or I need to point to a better resolver
-
moneromooo
Several people have reported an issue with .org DNSSEC recently. We do not know the reason yet.
-
moneromooo
AFAIK, the records are OK. They verify fine from some places, not from others.
-
moneromooo
It seems some places just somehow fuck things up.
-
xmrfn
DNS replication. Please let's not get started.
-
moneromooo
Which DNS are you using, if you don't mind sharing ?
-
xmrfn
lemme check
-
moneromooo
Also, does this also complain ? dig -t TXT updates.moneropulse.org
-
xmrfn
I don't have dig installed
-
xmrfn
yet... ;)
-
xmrfn
yes that worked, no errors, got a bunch of TXT records
-
xmrfn
; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20843
-
moneromooo
Oh, that is interesting... Maybe we do validate wrong then.
-
xmrfn
-
moneromooo
All we need is someone who's getting the problem to debug.
-
xmrfn
I'm happy to compile debug monerod and share logs
-
xmrfn
(or just change the log level if that helps ;) )
-
moneromooo
Not sure. I know close to nothing about DNSSEC.
-
moneromooo
Could be a bug in libunbound too. Who knows,
-
moneromooo
I guess you can run once with --log-level 0,*dns*:DEBUG in case anything interesting pops up.
-
xmrfn
sure, one min
-
moneromooo
Long shot though.
-
xmrfn
OK, from level 4 trace output, just before the DNS SEC fail warning, I see this:
-
xmrfn
"2022-07-26 19:20:11.051 [P2P0] DEBUG net contrib/epee/include/net/levin_protocol_handler_async.h:208 [71.203.124.67:18080 OUT] anvoke_handler, timeout: 5000
-
xmrfn
"
-
xmrfn
wait sorry that's probably irrelevamnt
-
xmrfn
Okay. monerod adds a pair of trust anchors, prints "Performing DNSSEC TXT record query". Connects to 71.203.124.67 , gets block hash, then "SERVFAIL no DS for DS org. while building chain of trust"
-
xmrfn
Then it tries a fallback: "Failed to verify DNSSEC record from updates.moneropulse.org, falling back to TCP with well known DNSSEC resolvers"
-
xmrfn
... which also fails
-
moneromooo
The 71.203.124.67 seems indeed unrelated.
-
xmrfn
Yeah I assume that's just bootstrapping the blockchain sync
-
xmrfn
Anyway I've pared down the log to what looks like the DNSSEC-relevant chunks. Where's the most useful place to put it?
-
moneromooo
The thread id is likely different.
-
moneromooo
paste.debian.net is nice.
-
moneromooo
Doens't boot tor out, no js...
-
xmrfn
Hmmm... hold on... after that initial warning, I see DNSSEC queries in the log but no indication of failure
-
xmrfn
maybe a transient on-startup thing?
-
xmrfn
-
moneromooo
The DNS queries query N (equal about 5 or so) records, and chceks the majority.
-
moneromooo
If one dies a horrible death, it is of no matter.
-
moneromooo
.co is a longstanding fuckup, based on the .co registrar being an idiot. org is a new fuckup, for reasons still unknown.
-
moneromooo
That still leaves a majority being ok.
-
xmrfn
-
moneromooo
Would you mind opening a github issue with those logs, so they don't get lost ?
-
xmrfn
ofc
-
xmrfn
Looks like a dupe of this, shall I just add my logs?
monero-project/monero #8452
-
moneromooo
Indeed. Sure, add your logs. Thanks.
-
selsta
with v0.18 i get a warning on my VPS and not with my home ISP
-
selsta
quite sure the reason it did not show up with v0.17 is that we were using an ancient unbound version
-
xmrfn
yes, my warning is on a VPS as well
-
moneromooo
Are you saying if you run 0.17 on the same host, you get no error/warning ?
-
selsta
i did make sure to update both expat (dnssec lib) and unbound (dns lib) to the latest release and it did not make a difference with the warning
-
selsta
moneromooo: the v0.17 release binaries used our 4 year old unbound fork, it did not show up with it yet
-
xmrfn
correct, same host, v.17 had no warning
-
moneromooo
That is a bit disquieting isn't it...
-
selsta
I know everyone is annoyed at me removing the unbound submodule but they had an audit and continuing to use the old version seemed like a security risk
ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results
-
selsta
hopefully once everyone updated to v0.18 and once we figure out the DNSSEC warnings it stops being an issue / annoyance
-
moneromooo
Well, maybe the .org chain was borked all along and nobody realized :)
-
selsta
Invalid DNSSEC TXT record signature for updates.moneropulse.org: validation failure <updates.moneropulse.org. TXT IN>: no DNSKEY rrset for trust anchor . while building chain of trust
-
selsta
xmrfn: do you see the exact same message with log 0 on your VPS?
-
xmrfn
yes
-
xmrfn
no wait!
-
selsta
ok. in your log 4 it looked a bit different, unless i overlooked the line i was looking for
-
xmrfn
different reason: "SERVFAIL no DS for DS org."
-
selsta
at least both are related to the .org
-
xmrfn
WARNING net.dns src/common/dns_utils.cpp:346 Invalid DNSSEC TXT record signature for updates.moneropulse.org: validation failure <updates.moneropulse.org. TXT IN>: SERVFAIL no DS for DS org. while building chain of trust
-
dsc_
hello monero science team, I also seem to have this DNS error
-
selsta
dsc_: on VPS?
-
dsc_
selsta: do you require me to load up my IDE+debugger? :P
-
dsc_
on desktop
-
selsta
i have no idea about DNSSEC :D
-
dsc_
me neither
-
dsc_
but can try
-
selsta
don't think it's a bug in ubound
-
selsta
unbound
-
selsta
it would be possible to bisect the unbound commit that causes the warning to show up
-
selsta
might help us figure what the issue is
-
selsta
and trying out different dns providers would also help figure out the issue
-
dsc_
nais I fixed it
-
dsc_
let me confirm
-
selsta
dsc_: how?
-
dsc_
-
selsta
tyyy looking currently
-
selsta
dsc_: ok we have to fix the first DS entry
-
selsta
but otherwise I'm still confused, would the issue still show up if you set 8.8.8.8 as your home DNS without doing PUBLIC_DNS env var?
-
dsc_
selsta: the issue is also fixed by doing something like `nameserver 8.8.8.8` in /etc/resolv.conf, yeah
-
dsc_
ill edit my thinger
-
selsta
ok so it is likely DNS provider misconfig?
-
dsc_
selsta: i found what causes it, I think now we need a DNS doctor/guru to tell us if what we are seeing is reasonable behaviour or not
-
dsc_
one thing to consider is that while updating libunbound, it simply got more verbose
-
dsc_
nvm scratch that
-
selsta
I assume you did try editing this first wrong DS value?
-
dsc_
but yeah, lets wait for a DNS person to chime in :)
-
dsc_
Yes, wrong DS value is fine as long as the right one eventually gets added
-
dsc_
actually I don't know if having a faulty DS value is an issue or not, but for our current bug it is irrelevant at least :)
-
dsc_
it adds both via `ub_ctx_add_ta`