Replies: 4 comments
-
The Are you sure something isn't listening on that IP/port instead? |
Beta Was this translation helpful? Give feedback.
-
The reason that @phonedph1 thinks the query is ran against an authoritative server is the
which is printed by Please show us your complete configuration. This looks more like a support question, so I'm turning this to a discussion. |
Beta Was this translation helpful? Give feedback.
-
In the
So it seems you're not talking to a recursor there. |
Beta Was this translation helpful? Give feedback.
-
Hello @phonedph1 and @omoerbeek, thank you for your really quick replies. You are completely right, things got mixed up during my analysis and the reply above is not from the pdns-recursor. Indeed the responses now look as expected. I finally was also able to get it working by adding |
Beta Was this translation helpful? Give feedback.
-
Using the pdns-recursor 4.4.2-3 package of Debian 11.
Background: I'm running a local pdns-recursor. When I tried to generate a letsencrypt wildcard certificate using the acmedns challenge it always failed with "could not determine authoritative nameserver". After spending a lot of time, the solution was to change the dns server used by the letsencrypt client to another one (for example 1.1.1.1 or 8.8.8.8). So it seems to be some issue with the pdns-recursor - which works without any issues, except in this case.
The example.com domain is configured like this:
The nameserver of example.com and auth.example.com are different.
dig @pdns-recursor _acme-challenge.example.com soa
dig @1.1.1.1 _acme-challenge.example.com soa
I think the issue is that the pdns-recursor is not returning the SOA record, but this is just a wild guess. I don't really understand why the responses are so different, because the pds-recursor is configured to forward all queries to 1.1.1.1/ 8.8.8.8 anyway:
Beta Was this translation helpful? Give feedback.
All reactions