I recently tried to access the IRS direct payment website, which is a crucial service for taxpayers wanting to make payments directly from their bank accounts. Given its importance, I expected it to be trustworthy. However, I encountered a problem: resolvers enforcing DNSSEC returned `rcode: SERVFAIL` for `directpay.irs.gov`. To bypass this issue, I ended up creating a specific forward-zone in my DNS server to utilize a non-validating resolver for this domain and had to disable my DNS validation. It's surprising that I couldn't find anyone discussing this problem online, as most users would likely just think the website is down.
5 Answers
It's pretty wild how often government systems have these issues. I remember when I worked with a fire department; their tech was outdated and not well-maintained. So, yeah, 'government can't computer good' definitely rings true here.
At the end of the day, I just care that the site matches its certificate. If it does anything else right, I'm genuinely surprised. Government tech seems to lag far behind modern security standards.
Honestly, fixing IRS tech is probably far down their to-do list. Their automated phone system sounds like it was made with the same tech as the scam callers, which is amusing yet frustrating!
DNSSEC often causes more headaches than it solves. It’s supposed to be secure, but in practice, it leads to numerous outages with little to no security benefits for most users.
I think people really misunderstand the purpose of DNSSEC. It's just a game people have to play so that customers don’t complain about things going 'wrong.' I guess if your DNS insists on security checks, it might be worth using resolvers that skip those requirements.

Related Questions
Keep Your Screen Awake Tool
Favicon Generator
JWT Token Decoder and Viewer
Ethernet Signal Loss Calculator
Glassmorphism CSS Generator with Live Preview
Remove Duplicate Items From List