DNS cookies on servers in anycast clusters or behind load balancers
  • 25 Feb 2019
  • 4 Minutes to read
  • Contributors
  • Dark
  • PDF

DNS cookies on servers in anycast clusters or behind load balancers

  • Dark
  • PDF

Article summary

DNS Cookies - what are they?

In BIND 9.11 and newer, DNS Cookies are enabled automatically. This means that when queried by a client (which might itself be another DNS server, or just a resolver stub) that supports this option, BIND will respond with a server cookie. Similarly, when querying other servers, BIND as a resolver will offer a DNS cookie unless it has been configured not to do this (globally or per-server).

For more information about DNS Cookies, see https://kb.isc.org/docs/aa-01387 "DNS Cookies in BIND 9".

Potential Interoperability Problems

Most of the time, clients and servers that support DNS cookies will happily interoperate with clients and servers that do not and no special configuration options should be necessary. But there is one specific scenario where DNS server operators may need to pay attention and potentially make configuration changes.

This scenario is the anycast or load-balanced cluster - specifically one in which many servers are provisioned behind a single IP address, and where a client may be querying several different servers at different times, but presented to the client as a single server instance.

In that case, a client that supports DNS Cookies may find that the server cookie that it cached appears to change arbitrarily, or perhaps that sometimes the server supports DNS Cookies, and other times it does not.

DNS Cookie-aware client implementations should be able to handle 'broken' server cookie implementations
Although the above scenario may cause warnings and intermittent query retries, it should not cause a service outage unless the client is not RFC-compliant or has been implemented particularly strictly.

Operating a Homogeneous Anycast or Load-balanced Cluster

If all of your DNS servers are running a version of BIND that supports DNS Cookies, then it is possible to generate your own cookie secret that they all share - this will ensure that they all respond identically.

You first need to know how many bits of secret that you need - and this is determined by the cookie-algorithm, either default or specified explicitly.

The default for cookie-algorithm is:

  • AES (if your cryptographic library supports this) - cookie-secret 128 bits
  • Otherwise SHA256 - cookie-secret 256 bits

If you explicitly set SHA1, then the cookie-secret would need 160 bits.

Next, you need to generate a random secret. One way to do this is to make use of the system's source of randomness - typically /dev/random, but some operating environments might need instead /dev/urandom or /dev/prandom.

The following command (as an example) will generate 128 bits that can be used as a cookie-secret with AES:

$ dd if=/dev/random bs=16 count=1 | od -x
1+0 records in
1+0 records out
16 bytes transferred in 0.000029 secs (550073 bytes/sec)
0000000      8217    891b    cbbc    a1b7    9030    69d2    0d20    c4c2

This can then be used in named.conf like this:

cookie-secret "8217891bcbbca1b7903069d20d20c4c2";

The advantage of generating cookie-secret locally is that you might, for ease of system administration, want to script a process for updating it periodically.

Another method for generating a secret string would be to use a publicly available source of randomness such as random.org:

For AES: https://www.random.org/cgi-bin/randbyte?nbytes=16&format=h

For SHA256: https://www.random.org/cgi-bin/randbyte?nbytes=32&format=h

For SHA1: https://www.random.org/cgi-bin/randbyte?nbytes=20&format=h

Operating a Heterogeneous Anycast or Load-balanced Cluster

If you are running a mixture of DNS servers - typically this is to introduce security by diversity by deploying DNS services from several different software providers - you may not be able to configure them to handle DNS cookies identically.

Unless it is causing actual operational problems, you should be able to just ignore the issue. Clients are supposed to handle multiple BADCOOKIE responses and switch over to TCP. (Both named and dig will do this).

RFC 7873 says:

If the extended RCODE in the reply is BADCOOKIE and the Client Cookie in the reply matches what was sent, it means that the server was unwilling to process the request because it did not have the correct Server Cookie in it. The client SHOULD retry the request using the new Server Cookie from the response. Repeated BADCOOKIE responses to requests that use the Server Cookie provided in the previous response may be an indication that either the shared secrets or the method for generating secrets in an anycast cluster of servers is inconsistent. If the reply to a retried request with a fresh Server Cookie is BADCOOKIE, the client SHOULD retry using TCP as the transport, since the server will likely process the request normally based on the security provided by TCP (see Section 5.2.3).
Nevertheless some operators may wish to disable DNS Cookies on their BIND servers.

In BIND 9.11.4, and BIND 9.12.2 and all newer versions of BIND, there is an option to disable server cookies:

answer-cookie no ;
Future DNS servers will inter-operate properly with DNS cookies
The initial implementations of DNS cookies were created independently following an RFC that was incomplete; future protocol developments by the developers of DNS software will address this problem so that operators of heterogeneous clusters will be able to configure them to behave identically when handling client DNS cookie negotiations

How can I tell if I have a problem with DNS Cookies on my Anycast or Load-balanced Cluster servers?

As alluded to above, any problems encountered are likely to appear to be an intermittent issue responding to clients. What is happening is that clients that support DNS cookies have learned the server cookie of the first (or most recent) server in the cluster that they communicated with. They then send that cookie again to the server cluster, and this time a different server responds - with BADCOOKIE in the query response.

The servers may also 'fail' when the domain is tested at https://ednscomp.isc.org/ednscomp

Network packet traces may give misleading results
Packet trace analysis tools that aren't aware of extended DNS error codes may report that your servers are responding to queries with YXRRSET. This is because this is the error code value when interpreting the bottom 4 bits of BADCOOKIE