dns-over-tls queries?

Hi,

I had observed some traffic arriving at our recursive servers
which tried to connect to port 853 (the dns-over-tls port), so
I've now spun up an unbound to serve those requests.

Initially I'm running with query logging turned on, and I'm
slightly disappointed to report that all the queries I find
in the log conform to this pattern:

Feb 4 16:00:56 myname unbound: [22507:0] info: a.b.c.d null TYPE0 CLASS0 REFUSED 0.000000 1 12

where a.b.c.d is the IP address of the client. There doesn't
appear to arrive other queries from the client, but the client
will repeat the probing periodically. Type 0 is supposed to be
used as a special indicator for the SIG(0) RR, and must not
otherwise be used, whereas class 0 is reserved (IN is class 1),
says RFC 6895.

Does anyone know what type of client does this? Since I don't
appear to receive other queries than these probes over dns-
over-tls I'm curious to know whether it's something wrong at my
end.

I have a properly signed certificate for the service; both the
name and the IP addresses are part of the certificate.

Regards,

- Håvard

Hi,

following up on my own message:

Feb 4 16:00:56 myname unbound: [22507:0] info: a.b.c.d null TYPE0 CLASS0 REFUSED 0.000000 1 12

Using kdig, I see the same problem client-side:

% kdig -4 @a.b.c.d:853 vg.no. a +tls
;; WARNING: response doesn't have question section
;; TLS session (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA512)-(AES-256-GCM)
;; ->>HEADER<<- opcode: QUERY; status: REFUSED; id: 54977
;; Flags: qr rd; QUERY: 0; ANSWER: 0; AUTHORITY: 0; ADDITIONAL: 0

;; Received 12 B
;; Time 2019-02-05 13:22:00 CET
;; From a.b.c.d8@853(TCP) in 14.9 ms
%

Hrm, doesn't work as advertised. Need to dig deeper. Hints?

Regards,

- Håvard

Hi Håvard,

The reply looks like this when the client's IP address is refused by
unbound's access-control. When a local-zone refuses it, the query name
would be present in the reply.

Unbound simply won't parse the query from the unallowed source, and thus
the short reply contents.

The null TYPE0 CLASS0 is an artifact of that it doesn't parse it, and
then has nothing to print for log-replies.

Best regards, Wouter

following up on my own message:

Feb 4 16:00:56 myname unbound: [22507:0] info: a.b.c.d null TYPE0 CLASS0 REFUSED 0.000000 1 12

Ignore me. This is what happens when the server doesn't allow
the client access to the service, via access-control...

Regards,

- Håvard