[sf-lug] "resolved": Re: Comcast Business DNS problems - yet again ([ns1.]linuxmafia.com 96.95.217.99 ...)

Michael Paoli michael.paoli at cal.berkeley.edu
Sun Sep 24 13:50:25 PDT 2023


And, it appears at least for the moment, the issue is "resolved"
by 2023-09-24 10:56AM US/Pacific PST8PDT -07:00.
Though persistence of that resolution may still be an issue.

Some relevant bits:

---------- Forwarded message ---------
From: Rick Moen <rick at linuxmafia.com>
Date: Sun, Sep 24, 2023 at 10:56 AM

Coincidentally, I got woken up by a Comcast middle-grade service rep. in
Denver, who tried a few things culminating with removing the
SecurityEdge service from our account.  In quick testing, I am
reasonably sure this has fixed (for now) the problem, and all I have to
do now is (according to the NANOG worthy) repeat this bushwah ad
infinitum every time Comcast decides to roll out a firmware update.

I am _certain_ neither Cheryl nor I ever elected to add the SecurityEdge
product to our account.
https://business.comcast.com/enterprise/products-services/cybersecurity-services/comcast-business-securityedge

linuxmafia:~# dig sflug.com axfr @96.86.170.229 | wc -l
38
linuxmafia:~# traceroute -nTp 53 96.86.170.229
traceroute to 96.86.170.229 (96.86.170.229), 30 hops max, 40 byte
packets
 1  96.95.217.102  2.658 ms  3.009 ms  2.752 ms
 2  100.92.140.67  14.323 ms  19.645 ms 100.92.140.66  19.094 ms
 3  96.216.9.185  12.476 ms 96.216.9.177  12.033 ms 96.216.9.185  11.143
ms
 4  68.85.154.117  10.678 ms 68.85.154.113  10.206 ms  9.875 ms
 5  96.108.99.245  11.514 ms  16.932 ms 96.108.99.249  21.265 ms
 6  68.86.143.89  15.108 ms  15.630 ms  14.518 ms
 7  162.151.87.226  14.724 ms 162.151.86.58  13.462 ms  17.528 ms
 8  162.151.79.134  19.282 ms 162.151.78.186  16.072 ms  15.112 ms
 9  68.85.103.154  16.792 ms 68.85.191.206  15.629 ms  15.249 ms
10  73.189.65.18  28.179 ms  22.635 ms  25.685 ms
11  96.86.170.229  25.125 ms  30.377 ms  29.757 ms
linuxmafia:~#

linuxmafia:~# dig @96.86.170.225 +noall +answer +nottl comcast.com. A
;; connection timed out; no servers could be reached
linuxmafia:~#

Querying a NON-nameserver now (correctly) fails.

https://mailman.nanog.org/pipermail/nanog/2023-September/223337.html

On Fri, Sep 22, 2023 at 8:49 PM Michael Paoli
<michael.paoli at cal.berkeley.edu> wrote:
>
> Alas, Comcast Business is at it yet again.
> They've again broken DNS, notably
> at their gateway device, between most notably
> [ns1.]linuxmafia.com 96.95.217.99
> and The Internet, when and where
> [ns1.]linuxmafia.com 96.95.217.99
> is client, and any Internet IP addresses beyond that gateway device, are
> server, e.g. when
> [ns1.]linuxmafia.com 96.95.217.99
> functions as secondary and primary is elsewhere on
> The Internet.  The DNS problem is much more pervasive than that, with
> that gateway device, but the above is most notable impact,
> particularly for those beyond that local subnet,
> e.g. The rest of The Internet using
> [ns1.]linuxmafia.com 96.95.217.99
> as authoritative nameserver for many DNS zones.
> Notably it can't get its updates for zones it's secondary for,
> due to Comcast reintroducing apparently same problem they introduced a
> while ago.  And this was after Comcast Business not that long ago
> replaced the device to "fix" the issue ... and now the issue has
> returned yet again.
>
> Anyway, Rick is again working with Comcast Business to get them to fix
> their DNS mess up yet again.
>
> Meantime, I'm going to reimplement some workarounds where feasible,
> notably for zones where I also have DNS admin access to the primary
> servers.  Alas, had that in place until fairly recently, took it out
> after Comcast Business fixed the earlier issue.  Looks like time to
> put it back again.  I and I think this time around I probably leave
> it in place for 90+ days after Comcast Business "fixes" their issue
> ... in case they break it yet again not too long after "fixing" it.
> Or maybe I do up to 6 months or a year.  Not exactly gettin' the warm
> 'n fuzzy feelings from Comcast Business.
>
> And for the curious, on Comcast, might want to see if your DNS actually
> truly works, or if they subvert your DNS traffic too, and don't let you
> actually get that directly from The Internet.  And yes, there may be
> workarounds, oh, ... like run DNS on a different port, or (ugh) do DNS
> over TLS or HTTPS).
>
> Anyway, some technical details on the breakage (and thus far looks to be
> exactly same issue as before):
>
> On Thu, Sep 21, 2023 at 11:05 PM Michael Paoli
> <michael.paoli at cal.berkeley.edu> wrote:
> > Oh dear ...
> > $ hostname && ip -4 a s | fgrep inet | fgrep -v 127.
> > linuxmafia.com
> >     inet 96.95.217.99/29 brd 96.95.217.103 scope global eth2
> > $ hostname && ip -4 a s | fgrep inet | fgrep -v 127.
> > linuxmafia.com
> >     inet 96.95.217.99/29 brd 96.95.217.103 scope global eth2
> > $ (set -x; dig @$(dig +short com. NS | head -n 1) +noall +authority
> > sflug.com. NS)
> > ++ dig +short com. NS
> > ++ head -n 1
> > + dig @b.gtld-servers.net. +noall +authority sflug.com. NS
> > $ nc -vz b.gtld-servers.net. 53
> > b.gtld-servers.net [192.33.14.30] 53 (domain) open
> > $
> > # hostname && ip -4 a s | fgrep inet | fgrep -v 127.
> > linuxmafia.com
> >     inet 96.95.217.99/29 brd 96.95.217.103 scope global eth2
> > # traceroute -nTp 53 192.33.14.30
> > traceroute to 192.33.14.30 (192.33.14.30), 30 hops max, 40 byte packets
> >  1  192.33.14.30  2.795 ms  3.157 ms  3.672 ms
> > #
>
> Note in the above that in reality 192.33.14.30
> is absolutely not 1 hop away.
>
> And in the below, take note that at
> present here's absolutely nothing
> on or currently using 96.86.170.228:
>
> > # traceroute -nTp 53 96.86.170.228
> > traceroute to 96.86.170.228 (96.86.170.228), 30 hops max, 40 byte packets
> >  1  96.86.170.228  1.916 ms  1.615 ms  1.230 ms
> > # dig @96.86.170.228 +short www.google.com. A
> > 142.251.46.228
> > #
>
> > On Thu, Sep 21, 2023 at 10:44 PM Michael Paoli
> > <michael.paoli at cal.berkeley.edu> wrote:
> > >
> > > Okay ... let me have a look and see what's up ....
> > >
> > > On Thu, Sep 21, 2023 at 6:59 PM Rick Moen <rick at linuxmafia.com> wrote:
> > > >
> > > > I was getting a whole lot of weird errors in my logfiles about
> > > > 96.86.170.229 not being authoritative.  Some basic command-line
> > > > checks show I'm not getting AXFR from it.
> > > >
> > > > [rick at linuxmafia]
> > > > ~ $ dig sflug.com ns @a.gtld-servers.net. +short
> > > > ns1.sf-lug.org.
> > > > ns1.linuxmafia.com.
> > > > nsy.sunnysidex.com.
> > > > nsx.sunnyside.com.
> > > > [rick at linuxmafia]
> > > > ~ $ dig sflug.com. soa @ns1.sf-lug.org. +short
> > > > ns1.sf-lug.org. jim.well.com. 1695151540 10800 3600 3600000 86400
> > > > [rick at linuxmafia]
> > > > ~ $ dig sflug.com. axfr @ns1.sf-lug.org. +short
> > > > ; Transfer failed.
> > > > [rick at linuxmafia]
> > > > ~ $ dig ns1.sf-lug.org. +short
> > > > 96.86.170.229
> > > > [rick at linuxmafia]
> > > > ~ $



More information about the sf-lug mailing list