{"id":2615,"date":"2019-10-22T17:26:21","date_gmt":"2019-10-22T09:26:21","guid":{"rendered":"https:\/\/www.mondoze.com\/guide\/?post_type=kb&p=2615"},"modified":"2022-10-05T08:02:44","modified_gmt":"2022-10-05T00:02:44","slug":"troubleshooting-dnssec","status":"publish","type":"kb","link":"https:\/\/www.mondoze.com\/guide\/kb\/troubleshooting-dnssec","title":{"rendered":"Troubleshooting DNSSEC"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Troubleshooting DNSSEC<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Testing DNSSEC with Dig<\/strong><\/h3>

Dig<\/em>\u00a0is a command-line tool to query a nameserver for DNS records. For instance,\u00a0dig\u00a0<\/em>can ask a DNS resolver for the IP address of\u00a0www.cloudflare.com\u00a0<\/em>(The option\u00a0+short<\/em>\u00a0outputs the result only):<\/em><\/p>

$\u00a0dig www.cloudflare.com +short 198.41.215.162 198.41.214.162<\/pre>

Use\u00a0dig<\/em>\u00a0to verify DNSSEC records. \u00a0In the example below, the last line of output is the\u00a0RRSIG\u00a0record<\/em>. \u00a0RRSIG<\/em> is the DNSSEC signature attach to the record. With the RRSIG<\/em>, a DNS resolver determines whether a DNS response is trust.<\/span><\/p>

$\u00a0dig www.cloudflare.com +dnssec +short 198.41.214.162 198.41.215.162 A 13 3 300 20180927180434 20180925160434 35273 cloudflare.com. DYYZ\/bhHSAIlpvu\/HEUsxlzkC9NsswbCQ7dcfcuiNBrbhYV7k3AI8t46 QMnOlfhwT6jqsfN7ePV6Fwpym3B0pg==<\/pre>

Dig<\/em> also retrieves the public key use to verify the DNS record. \u00a0A domain’s DNS records are all signed with the same public key. Therefore,<\/span>\u00a0query for the root domain’s public key, not the subdomain’s public key:<\/p>

$\u00a0dig\u00a0DNSKEY cloudflare.com +short 257 3 13 mdsswUyr3DPW132mOi8V9xESWE8jTo0dxCjjnopKl+GqJxpVXckHAeF+ KkxLbxILfDLUT0rAK9iUzy1L53eKGQ== 256 3 13 koPbw9wmYZ7ggcjnQ6ayHyhHaDNMYELKTqT+qRGrZpWSccr\/lBcrm10Z\u00a01PuQHB3Azhii+sb0PYFkH1ruxLhe5g==<\/pre>

The DNS response includes two records:<\/p>