At the moment it is impossible to issue any more certificates for my domain because CAA lookups SRVFAIL:
[Mon Oct 9 00:05:45 CEST 2017] firc.de:Verify error:DNS problem: SERVFAIL looking up CAA for firc.de
The domains primary NS is ns.inwx.de, which answers correctly:
$ dig +dnssec CAA firc.de. @ns.inwx.de
firc.de. 3600 IN CAA 0 issue "letsencrypt.org"
firc.de. 3600 IN CAA 0 iodef "mailto:hostmaster@firc.de"
The lookups fail on LetsEncrypt and 8.8.8.8, but work on 141.1.1.1.
The 8.8.8.8 aspect seems very strange, since +dnssec lookups for e.g. A or MX succeed.
This seems to be a DNSSEC issue. While DNSSEC seems to be configured correctly and a valid signature is provided for things like the A record, there seems to be an issue for the CAA record.
You can use DNSViz to check for CAA specifically, the results can be found here. It's reporting the following error:
firc.de/CAA: No RRSIG covering the RRset was returned in the response. (46.165.212.97, 95.211.1.145, 108.59.8.65, 176.97.158.104, 192.174.68.104, 2001:67c:1bc::104, 2001:67c:10b8::104, 2001:1af8:4400:a048:1::1, 2604:9a00:2010:a013:1::1, 2a00:c98:2100:a006:3::1, UDP_0_EDNS0_32768_4096)
@pfg and @sahsanu: Thank you both so much!
I’m letting Knot handle DNSSEC automatically.
Will have to investigate why RRSIG records are not created for CAA.
Very many thanks to you again, I wouldn’t have found this in 1000 years.
Just a quick edit to vindicate Knot:
Knot creates RRSIGs correctly, it’s the upstream nameservers that do not seem to propagate it.
Same here, my bind manages dnssec, and i use inwx-servers as slaves. If I compare my zone with the zone-data visible in inwx-webinterface, the rrsig for caa is lost. I was in contact with inwx, but problem still is not resolved.
They do support caa and dnssec, bot not both at the same time.
They just told me the same thing.
What are alternatives? I’d like to keep my master-slave setup.
ClouDNS for 2 USD/month seems reasonable, but maybe there’s something better?