DNS

DNS 2 SERVFAIL vs 20 BADNAME

Both DNS 2 (SERVFAIL) and 20 (BADNAME) belong to the DNS Response Codes (RCODEs) category. 2 indicates that server failure. The name server encountered an internal error while processing the query. Meanwhile, 20 means that duplicate key name. The key name in a TKEY negotiation is already in use or conflicts with an existing key.

Description

Server failure. The name server encountered an internal error while processing the query.

Quand vous le voyez

The recursive resolver could not get an authoritative answer — commonly caused by DNSSEC validation failures, unreachable upstream nameservers, or misconfigured zones.

Comment résoudre

Try a different resolver (e.g., 8.8.8.8 or 1.1.1.1) to isolate the issue. If you control the zone, check DNSSEC signatures, SOA serial consistency, and nameserver reachability.

Description

Duplicate key name. The key name in a TKEY negotiation is already in use or conflicts with an existing key.

Quand vous le voyez

A TKEY key establishment failed because a key with the same name already exists on the server from a previous session that was not properly cleaned up.

Comment résoudre

Use a unique key name for each TKEY session (e.g., append a timestamp or random suffix). Delete stale keys on the server if they are no longer needed.

Différences clés

1.

DNS 2: Server failure. The name server encountered an internal error while processing the query.

2.

DNS 20: Duplicate key name. The key name in a TKEY negotiation is already in use or conflicts with an existing key.

3.

You encounter 2 when the recursive resolver could not get an authoritative answer — commonly caused by DNSSEC validation failures, unreachable upstream nameservers, or misconfigured zones.

4.

You encounter 20 when a TKEY key establishment failed because a key with the same name already exists on the server from a previous session that was not properly cleaned up.

Quand utiliser lequel

For 2 (SERVFAIL): Try a different resolver (e.g., 8.8.8.8 or 1.1.1.1) to isolate the issue. If you control the zone, check DNSSEC signatures, SOA serial consistency, and nameserver reachability. For 20 (BADNAME): Use a unique key name for each TKEY session (e.g., append a timestamp or random suffix). Delete stale keys on the server if they are no longer needed.

En savoir plus