I added the val-log-level:2
line and I did see some interesting stuff. Specifically:
validation failure <dnssec.works. A IN>: key for validation . is marked as invalid because of a previous validation failure <. DNSKEY IN>: no signatures from 192.5.5.241 for trust anchor . while building chain of trust
But I can't say for sure what to make of that.
aamm19@pihole:~ $ dig dnssec.works @127.0.0.1 -p 5335
; <<>> DiG 9.16.33-Debian <<>> dnssec.works @127.0.0.1 -p 5335
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 33930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;dnssec.works. IN A
;; Query time: 27 msec
;; SERVER: 127.0.0.1#5335(127.0.0.1)
;; WHEN: Sun Dec 04 12:10:44 CST 2022
;; MSG SIZE rcvd: 41
aamm19@pihole:~ $ tail -f /var/log/unbound/unbound.log
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: start
Dec 04 12:10:44 unbound[31914:0] debug: subnet[module 0] operate: extstate:module_state_initial event:module_event_new
Dec 04 12:10:44 unbound[31914:0] info: subnet operate: query dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: subnet: not found in cache. pass to next module
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: subnet module exit state is module_wait_module
Dec 04 12:10:44 unbound[31914:0] debug: validator[module 1] operate: extstate:module_state_initial event:module_event_pass
Dec 04 12:10:44 unbound[31914:0] info: validator operate: query dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: validator: pass to next module
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: validator module exit state is module_wait_module
Dec 04 12:10:44 unbound[31914:0] debug: iterator[module 2] operate: extstate:module_state_initial event:module_event_pass
Dec 04 12:10:44 unbound[31914:0] debug: process_request: new external request event
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state INIT REQUEST STATE
Dec 04 12:10:44 unbound[31914:0] info: resolving dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: request has dependency depth of 0
Dec 04 12:10:44 unbound[31914:0] debug: cache delegation returns delegpt
Dec 04 12:10:44 unbound[31914:0] info: DelegationPoint<.>: 13 names (7 missing), 19 addrs (0 result, 19 avail) cacheNS
Dec 04 12:10:44 unbound[31914:0] info: a.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: m.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: l.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: k.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: j.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: i.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: h.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: g.root-servers.net. A
Dec 04 12:10:44 unbound[31914:0] info: f.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: e.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: d.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: c.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: b.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:200::b port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.9.14.201 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2::c port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.33.4.12 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2d::d port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.7.91.13 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:a8::e port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.203.230.10 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2f::f port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.5.5.241 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.112.36.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 198.97.190.53 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.36.148.17 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.58.128.30 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 193.0.14.129 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.7.83.42 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 202.12.27.33 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:503:ba3e::2:30 port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 198.41.0.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state INIT REQUEST STATE (stage 2)
Dec 04 12:10:44 unbound[31914:0] info: resolving (init part 2): dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state INIT REQUEST STATE (stage 3)
Dec 04 12:10:44 unbound[31914:0] info: resolving (init part 3): dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state QUERY TARGETS STATE
Dec 04 12:10:44 unbound[31914:0] info: processQueryTargets: dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: processQueryTargets: targetqueries 0, currentqueries 0 sentcount 0
Dec 04 12:10:44 unbound[31914:0] info: DelegationPoint<.>: 13 names (0 missing), 19 addrs (0 result, 19 avail) cacheNS
Dec 04 12:10:44 unbound[31914:0] info: a.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: m.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: l.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: k.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: j.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: i.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: h.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: g.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: f.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: e.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: d.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: c.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: b.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:200::b port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.9.14.201 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2::c port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.33.4.12 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2d::d port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.7.91.13 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:a8::e port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.203.230.10 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2f::f port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.5.5.241 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.112.36.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 198.97.190.53 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.36.148.17 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.58.128.30 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 193.0.14.129 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.7.83.42 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 202.12.27.33 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:503:ba3e::2:30 port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 198.41.0.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: removing 1 labels
Dec 04 12:10:44 unbound[31914:0] debug: attempt to get extra 3 targets
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 198.41.0.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=159 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 202.12.27.33 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=187 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 199.7.83.42 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=200 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 193.0.14.129 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=230 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.58.128.30 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=187 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.36.148.17 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=234 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 198.97.190.53 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=302 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.112.36.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=242 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.5.5.241 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=110 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.203.230.10 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=196 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 199.7.91.13 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=233 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.33.4.12 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=297 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 199.9.14.201 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=239 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: selrtt 360110
Dec 04 12:10:44 unbound[31914:0] debug: chase to recursion lame server
Dec 04 12:10:44 unbound[31914:0] debug: chase to dnssec lame server
Dec 04 12:10:44 unbound[31914:0] info: sending query: works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: sending to target: <.> 192.33.4.12#53
Dec 04 12:10:44 unbound[31914:0] debug: dnssec status: expected but lame_query anyway
Dec 04 12:10:44 unbound[31914:0] debug: EDNS lookup known=1 vs=0
Dec 04 12:10:44 unbound[31914:0] debug: serviced query UDP timeout=297 msec
Dec 04 12:10:44 unbound[31914:0] debug: inserted new pending reply id=c888
Dec 04 12:10:44 unbound[31914:0] debug: opened UDP if=0 port=46742
Dec 04 12:10:44 unbound[31914:0] debug: comm point start listening 17 (-1 msec)
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: iterator module exit state is module_wait_reply
Dec 04 12:10:44 unbound[31914:0] info: mesh_run: end 1 recursion states (1 with reply, 0 detached), 1 waiting replies, 0 recursion replies sent, 0 replies dropped, 0 states jostled out
Dec 04 12:10:44 unbound[31914:0] info: 0RDd mod2 rep dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: cache memory msg=69665 rrset=73368 infra=11669 val=66651 subnet=74504
Dec 04 12:10:44 unbound[31914:0] debug: answer cb
Dec 04 12:10:44 unbound[31914:0] debug: Incoming reply id = c888
Dec 04 12:10:44 unbound[31914:0] debug: Incoming reply addr = ip4 192.33.4.12 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: lookup size is 1 entries
Dec 04 12:10:44 unbound[31914:0] debug: received udp reply.
Dec 04 12:10:44 unbound[31914:0] debug: udp message[91:0] C8888180000100000001000005776F726B730000010001C00C0006000100000D9000380476306E30036E6963C00C0A686F73746D617374657206646F6E75747305656D61696C00638CDDC200001C20000003840012750000000E10
Dec 04 12:10:44 unbound[31914:0] debug: outnet handle udp reply
Dec 04 12:10:44 unbound[31914:0] debug: measured roundtrip at 11 msec
Dec 04 12:10:44 unbound[31914:0] debug: svcd callbacks start
Dec 04 12:10:44 unbound[31914:0] debug: worker svcd callback for qstate 0x55b51f4700
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: start
Dec 04 12:10:44 unbound[31914:0] debug: iterator[module 2] operate: extstate:module_wait_reply event:module_event_reply
Dec 04 12:10:44 unbound[31914:0] info: iterator operate: query dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: process_response: new external response event
Dec 04 12:10:44 unbound[31914:0] info: scrub for . NS IN
Dec 04 12:10:44 unbound[31914:0] info: response for dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] info: reply from <.> 192.33.4.12#53
Dec 04 12:10:44 unbound[31914:0] info: incoming scrubbed packet: ;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 0
;; flags: qr rd ra ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
works. IN A
;; ANSWER SECTION:
;; AUTHORITY SECTION:
works. 3472 IN SOA v0n0.nic.works. hostmaster.donuts.email. 1670176194 7200 900 1209600 3600
;; ADDITIONAL SECTION:
;; MSG SIZE rcvd: 91
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state QUERY RESPONSE STATE
Dec 04 12:10:44 unbound[31914:0] info: query response was nodata ANSWER
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state QUERY TARGETS STATE
Dec 04 12:10:44 unbound[31914:0] info: processQueryTargets: dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: processQueryTargets: targetqueries 0, currentqueries 0 sentcount 1
Dec 04 12:10:44 unbound[31914:0] info: DelegationPoint<.>: 13 names (0 missing), 19 addrs (19 result, 0 avail) cacheNS
Dec 04 12:10:44 unbound[31914:0] info: a.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: m.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: l.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: k.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: j.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: i.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: h.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: g.root-servers.net. * A
Dec 04 12:10:44 unbound[31914:0] info: f.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: e.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: d.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: c.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] info: b.root-servers.net. * A AAAA
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:200::b port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.9.14.201 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2::c port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.33.4.12 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2d::d port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.7.91.13 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:a8::e port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.203.230.10 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:500:2f::f port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.5.5.241 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.112.36.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 198.97.190.53 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.36.148.17 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 192.58.128.30 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 193.0.14.129 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 199.7.83.42 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 202.12.27.33 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: ip6 2001:503:ba3e::2:30 port 53 (len 28)
Dec 04 12:10:44 unbound[31914:0] debug: ip4 198.41.0.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: attempt to get extra 3 targets
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 199.9.14.201 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=239 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.33.4.12 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=234 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 199.7.91.13 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=233 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.203.230.10 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=196 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.5.5.241 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=110 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.112.36.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=242 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 198.97.190.53 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=302 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.36.148.17 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=234 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 192.58.128.30 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=187 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 193.0.14.129 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=230 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 199.7.83.42 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=200 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 202.12.27.33 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=187 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: servselect ip4 198.41.0.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: rtt=159 REC_LAME
Dec 04 12:10:44 unbound[31914:0] debug: selrtt 360110
Dec 04 12:10:44 unbound[31914:0] debug: chase to recursion lame server
Dec 04 12:10:44 unbound[31914:0] debug: chase to dnssec lame server
Dec 04 12:10:44 unbound[31914:0] info: sending query: dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: sending to target: <.> 192.112.36.4#53
Dec 04 12:10:44 unbound[31914:0] debug: dnssec status: expected but lame_query anyway
Dec 04 12:10:44 unbound[31914:0] debug: EDNS lookup known=1 vs=0
Dec 04 12:10:44 unbound[31914:0] debug: serviced query UDP timeout=242 msec
Dec 04 12:10:44 unbound[31914:0] debug: inserted new pending reply id=8661
Dec 04 12:10:44 unbound[31914:0] debug: opened UDP if=0 port=27512
Dec 04 12:10:44 unbound[31914:0] debug: comm point start listening 18 (-1 msec)
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: iterator module exit state is module_wait_reply
Dec 04 12:10:44 unbound[31914:0] info: mesh_run: end 1 recursion states (1 with reply, 0 detached), 1 waiting replies, 0 recursion replies sent, 0 replies dropped, 0 states jostled out
Dec 04 12:10:44 unbound[31914:0] info: 0RDd mod2 rep dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: cache memory msg=69912 rrset=73662 infra=11669 val=66651 subnet=74504
Dec 04 12:10:44 unbound[31914:0] debug: svcd callbacks end
Dec 04 12:10:44 unbound[31914:0] debug: close of port 46742
Dec 04 12:10:44 unbound[31914:0] debug: close fd 17
Dec 04 12:10:44 unbound[31914:0] debug: answer cb
Dec 04 12:10:44 unbound[31914:0] debug: Incoming reply id = 8661
Dec 04 12:10:44 unbound[31914:0] debug: Incoming reply addr = ip4 192.112.36.4 port 53 (len 16)
Dec 04 12:10:44 unbound[31914:0] debug: lookup size is 1 entries
Dec 04 12:10:44 unbound[31914:0] debug: received udp reply.
Dec 04 12:10:44 unbound[31914:0] debug: udp message[46:0] 86618180000100010000000006646E7373656305776F726B730000010001C00C0001000100000D910004052D6B58
Dec 04 12:10:44 unbound[31914:0] debug: outnet handle udp reply
Dec 04 12:10:44 unbound[31914:0] debug: measured roundtrip at 13 msec
Dec 04 12:10:44 unbound[31914:0] debug: svcd callbacks start
Dec 04 12:10:44 unbound[31914:0] debug: worker svcd callback for qstate 0x55b51f4700
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: start
Dec 04 12:10:44 unbound[31914:0] debug: iterator[module 2] operate: extstate:module_wait_reply event:module_event_reply
Dec 04 12:10:44 unbound[31914:0] info: iterator operate: query dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: process_response: new external response event
Dec 04 12:10:44 unbound[31914:0] info: scrub for . NS IN
Dec 04 12:10:44 unbound[31914:0] info: response for dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] info: reply from <.> 192.112.36.4#53
Dec 04 12:10:44 unbound[31914:0] info: incoming scrubbed packet: ;; ->>HEADER<<- opcode: QUERY, rcode: NOERROR, id: 0
;; flags: qr rd ra ; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
dnssec.works. IN A
;; ANSWER SECTION:
dnssec.works. 3473 IN A 5.45.107.88
;; AUTHORITY SECTION:
;; ADDITIONAL SECTION:
;; MSG SIZE rcvd: 46
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state QUERY RESPONSE STATE
Dec 04 12:10:44 unbound[31914:0] info: query response was ANSWER
Dec 04 12:10:44 unbound[31914:0] debug: iter_handle processing q with state FINISHED RESPONSE STATE
Dec 04 12:10:44 unbound[31914:0] info: finishing processing for dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: iterator module exit state is module_finished
Dec 04 12:10:44 unbound[31914:0] debug: validator[module 1] operate: extstate:module_wait_module event:module_event_moddone
Dec 04 12:10:44 unbound[31914:0] info: validator operate: query dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: validator: nextmodule returned
Dec 04 12:10:44 unbound[31914:0] debug: val handle processing q with state VAL_INIT_STATE
Dec 04 12:10:44 unbound[31914:0] debug: validator classification positive
Dec 04 12:10:44 unbound[31914:0] info: no signer, using dnssec.works. TYPE0 CLASS0
Dec 04 12:10:44 unbound[31914:0] debug: val handle processing q with state VAL_FINISHED_STATE
Dec 04 12:10:44 unbound[31914:0] info: validation failure <dnssec.works. A IN>: key for validation . is marked as invalid because of a previous validation failure <. DNSKEY IN>: no signatures from 192.5.5.241 for trust anchor . while building chain of trust
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: validator module exit state is module_finished
Dec 04 12:10:44 unbound[31914:0] debug: subnet[module 0] operate: extstate:module_wait_module event:module_event_moddone
Dec 04 12:10:44 unbound[31914:0] info: subnet operate: query dnssec.works. A IN
Dec 04 12:10:44 unbound[31914:0] debug: mesh_run: subnet module exit state is module_finished
Dec 04 12:10:44 unbound[31914:0] debug: query took 0.024525 sec
Dec 04 12:10:44 unbound[31914:0] info: mesh_run: end 0 recursion states (0 with reply, 0 detached), 0 waiting replies, 1 recursion replies sent, 0 replies dropped, 0 states jostled out
Dec 04 12:10:44 unbound[31914:0] info: average recursion processing time 0.024525 sec
Dec 04 12:10:44 unbound[31914:0] info: histogram of recursion processing times
Dec 04 12:10:44 unbound[31914:0] info: [25%]=0 median[50%]=0 [75%]=0
Dec 04 12:10:44 unbound[31914:0] info: lower(secs) upper(secs) recursions
Dec 04 12:10:44 unbound[31914:0] info: 0.016384 0.032768 1
Dec 04 12:10:44 unbound[31914:0] debug: cache memory msg=70166 rrset=73906 infra=11669 val=66651 subnet=74504
Dec 04 12:10:44 unbound[31914:0] debug: svcd callbacks end
Dec 04 12:10:44 unbound[31914:0] debug: close of port 27512
Dec 04 12:10:44 unbound[31914:0] debug: close fd 18
@bigpcjunky here's the output for the trust anchor:
aamm19@pihole:~ $ sudo -u unbound unbound-anchor -v
/var/lib/unbound/root.key has content
success: the anchor is ok
Secondly, bit of a hack but is your Pi-hole set up to use Unbound, ie you're using localhost#5335
as the single upstream server? If so, try the dig command again but this time leave the port parameter off.
This will send it through Pi-hole which in turn will send it through Unbound anyway, and it will still fail. But now you can look at the Query Log and see how Pi-hole is interpreting the result. Maybe BOGUS or something else.
EDIT: I did have a bit more time than expected so I tried this ^ approach @chrislph
I made the change and strangely enough, I lost internet connection with the pi
aamm19@pihole:~ $ ping searx.com
PING searx.com (162.210.196.173) 56(84) bytes of data.
64 bytes from 162.210.196.173 (162.210.196.173): icmp_seq=2 ttl=52 time=49.6 ms
64 bytes from 162.210.196.173 (162.210.196.173): icmp_seq=3 ttl=52 time=49.1 ms
^C
--- searx.com ping statistics ---
3 packets transmitted, 2 received, 33.3333% packet loss, time 2010ms
rtt min/avg/max/mdev = 49.102/49.346/49.591/0.244 ms
aamm19@pihole:~ $ dig dnssec.works @127.0.0.1 -p 5335
; <<>> DiG 9.16.33-Debian <<>> dnssec.works @127.0.0.1 -p 5335
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 37089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;dnssec.works. IN A
;; Query time: 211 msec
;; SERVER: 127.0.0.1#5335(127.0.0.1)
;; WHEN: Sun Dec 04 12:38:46 CST 2022
;; MSG SIZE rcvd: 41
#I changed the Upstream DNS Server from OpenDNS here to 127.0.0.1#5335
aamm19@pihole:~ $ ping searx.com
ping: searx.com: Temporary failure in name resolution
aamm19@pihole:~ $ dig dnssec.works @127.0.0.1
; <<>> DiG 9.16.33-Debian <<>> dnssec.works @127.0.0.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 50728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;dnssec.works. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Sun Dec 04 12:39:12 CST 2022
;; MSG SIZE rcvd: 41