====== Troubleshooting ====== Test DNS TCP $ dig +short melbourneit.net. NS ns4.melbourneit.net. ns1.melbourneit.net. ns3.melbourneit.net. ns2.melbourneit.net. $ (for NS in $(dig +short melbourneit.net. NS | sort); do dig +noall +answer +nottl "$NS" A "$NS" AAAA | sort; done) ns1.melbourneit.net. IN A 203.55.142.15 ns2.melbourneit.net. IN A 203.55.143.15 ns3.melbourneit.net. IN A 203.55.142.16 ns4.melbourneit.net. IN A 203.55.143.16 $ nc -vz 203.55.142.15 53 Connection to 203.55.142.15 53 port [tcp/domain] succeeded! $ nc -vz 203.55.142.16 53 Connection to 203.55.142.16 53 port [tcp/domain] succeeded! $ (for IP in 203.55.142.15 203.55.142.16; do dig @"$IP" +tcp +noall +answer +norecurse +nomultiline +nosplit melbourneit.net. SOA | sed -e 's/$/; '"$IP"'/'; done) melbourneit.net. 3600 IN SOA ns1.melbourneit.net. admin.melbourneit.net. 2023050400 86400 7200 3600000 172800; 203.55.142.15 melbourneit.net. 3600 IN SOA ns1.melbourneit.net. admin.melbourneit.net. 2023050400 86400 7200 3600000 172800; 203.55.142.16 To get a servfail, run dig @1.1.1.1 dnssec-failed.org