I was testing TSIG with a well known key against TLD servers and got the 
following response.  Once you get past the bad class field (reported to the 
operator) there were a
number of other items:

* the tsig name does not match the request.
* the algorithm doesn’t match the algorithm in the request.
* time signed is not set.
* the fudge value is zero.

Should these match the request / be set for BADKEY?

Mark

% dig alstom. @195.253.64.11 soa -y xxxx:AAAA
14-Sep-2018 08:41:34.347 the key 'xxxx' is too short to be secure
;; Warning: Message parser reports malformed message packet.
;; Couldn't verify signature: not implemented

; <<>> DiG 9.13.1+hotspot+add-prefetch+marka <<>> alstom. @195.253.64.11 soa -y 
xxxx:AAAA
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOTAUTH, id: 56054
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 2
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;alstom.                                IN      SOA

;; TSIG PSEUDOSECTION:
.                       0       IN      TSIG    \# 17 
0000000000000000000000DAF600110000

;; Query time: 566 msec
;; SERVER: 195.253.64.11#53(195.253.64.11)
;; WHEN: Fri Sep 14 08:41:34 AEST 2018
;; MSG SIZE  rcvd: 63
;; WARNING -- Some TSIG could not be validated

% 

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to