That's
a curious error. Checking your domain my tool doesn't see a CAA or name server error - https://check-your-website.server-daten.de/?q=btcl.co.bw
Same using Unboundtest: https://unboundtest.com/m/CAA/co.bw/IBTJHII2
Query results for CAA co.bw
Response:
;; opcode: QUERY, status: NOERROR, id: 8760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;co.bw. IN CAA
;; AUTHORITY SECTION:
co.bw. 0 IN SOA dns1.nic.net.bw. registry.nic.net.bw. 2019121115 21600 3600 604800 3600
Letsencrypt uses an Unbound instance with the same configuration.
So two options:
- It's a temporary problem, try it one time again
- It's a problem. So create a CAA entry with btcl.co.bw, then co.bw isn't checked.
PS: It's not a Plesk problem.
PS: Oh, what's that? Checking https://unboundtest.com/m/CAA/btcl.co.bw/X4GM2UY3 there is an error:
Query results for CAA btcl.co.bw
Response:
;; opcode: QUERY, status: SERVFAIL, id: 27442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;btcl.co.bw. IN CAA
----- Unbound logs -----
Dec 11 14:23:23 unbound[7250:0] notice: init module 0: validator
Dec 11 14:23:23 unbound[7250:0] notice: init module 1: iterator
Dec 11 14:23:23 unbound[7250:0] info: start of service (unbound 1.9.3).
Dec 11 14:23:24 unbound[7250:0] info: 127.0.0.1 btcl.co.bw. CAA IN
Dec 11 14:23:24 unbound[7250:0] info: resolving btcl.co.bw. CAA IN
Dec 11 14:23:24 unbound[7250:0] info: priming . IN NS
Dec 11 14:23:24 unbound[7250:0] info: response for . NS IN
Dec 11 14:23:24 unbound[7250:0] info: reply from <.> 2001:7fe::53#53
Dec 11 14:23:24 unbound[7250:0] info: query response was ANSWER
Dec 11 14:23:24 unbound[7250:0] info: priming successful for . NS IN
Dec 11 14:23:25 unbound[7250:0] info: response for btcl.co.bw. CAA IN
Dec 11 14:23:25 unbound[7250:0] info: reply from <.> 2001:7fd::1#53
Dec 11 14:23:25 unbound[7250:0] info: query response was REFERRAL
Dec 11 14:23:26 unbound[7250:0] info: response for btcl.co.bw. CAA IN
Dec 11 14:23:26 unbound[7250:0] info: reply from <bw.> 168.167.98.226#53
Dec 11 14:23:26 unbound[7250:0] info: query response was DNSSEC LAME
Dec 11 14:23:27 unbound[7250:0] info: Capsforid: timeouts, starting fallback
Dec 11 14:23:27 unbound[7250:0] info: response for btcl.co.bw. CAA IN
Dec 11 14:23:27 unbound[7250:0] info: reply from <bw.> 2c0f:ff00:1:3::226#53
Dec 11 14:23:27 unbound[7250:0] info: Capsforid: reply is equal. go to next fallback
Dec 11 14:23:27 unbound[7250:0] info: response for btcl.co.bw. CAA IN
Dec 11 14:23:27 unbound[7250:0] info: reply from <bw.> 168.167.168.37#53
Dec 11 14:23:27 unbound[7250:0] info: Capsforid fallback: getting different replies, failed
The dns2.nic.net.bw
, one of the name servers of the bw zone, is terrible.
X |
Fatal error: Nameserver doesn't support TCP connection: dns2.nic.net.bw: Timeout |
X |
Nameserver Timeout checking Echo Capitalization: dns2.nic.net.bw |
X |
Nameserver Timeout checking EDNS512: dns2.nic.net.bw |
The bw zone is signed, so DNSSEC crashes if that name server is used (TCP is required).
Looks like the name servers are too buggy. But that's not something you can fix.