Difference between revisions of "DNS"

From Hackepedia
Jump to navigationJump to search
(→‎DNS Transport: maximum length)
 
(15 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
When you type "http://www.hackepedia.org" into the [[URL]] bar of your [[browser]], you are using the Domain Name System (DNS). This makes things a little easier for us, considering things actually use [[IP]]s instead.  
 
When you type "http://www.hackepedia.org" into the [[URL]] bar of your [[browser]], you are using the Domain Name System (DNS). This makes things a little easier for us, considering things actually use [[IP]]s instead.  
 
It would be a lot more difficult to memorize http://64.111.114.195 which would actually be a little faster for you as then you don't have to resolve DNS, but then again, that IP could change so DNS makes things more easy.
 
It would be a lot more difficult to memorize http://64.111.114.195 which would actually be a little faster for you as then you don't have to resolve DNS, but then again, that IP could change so DNS makes things more easy.
 +
 +
DNS was explained in RFC 1034 and RFC 1035 written in 1987 and has many modifications, see RFC Index.
  
 
== Distributed Database ==
 
== Distributed Database ==
Line 13: Line 15:
 
The tree set-up of delegating nameservers is intended to keep loads managable on the entire internet.  If you have an organization named
 
The tree set-up of delegating nameservers is intended to keep loads managable on the entire internet.  If you have an organization named
 
"skankyreggae" and wanted to be on the internet then you could take
 
"skankyreggae" and wanted to be on the internet then you could take
skankyreggae.tld as your domain name.  The root would point to .org
+
skankyreggae.tld as your domain name.  The root would point to .tld
and .tld would point to the nameservers serving skankyreggae.  You
+
and .tld would point to the nameservers serving skankyreggae.  You  
can host skankyreggae on your own computers provided they are reliably
+
can host skankyreggae on your own computers, by means of a DNS Server, provided they are reliably
 
on the Internet all the time.  When others seek skankyreggae.tld they
 
on the Internet all the time.  When others seek skankyreggae.tld they
 
would speak directly with your nameservers to get the IP of the
 
would speak directly with your nameservers to get the IP of the
 
www servers if they were seeking web.  They would look up MX records
 
www servers if they were seeking web.  They would look up MX records
if they tried to send mail to bob@skankyreggae.org and so on.
+
if they tried to send mail to bob@skankyreggae.tld and so on.
  
 
DNS is best explained in RFC's 1034 and 1035.
 
DNS is best explained in RFC's 1034 and 1035.
 +
 +
== gTLD and ccTLD domains ==
 +
 +
These can be viewed [http://iana.org/domains/root/db/ here] in the
 +
Root Zone database.
 +
  
 
== Resolving ==
 
== Resolving ==
Line 60: Line 68:
  
 
You can see the "Non-authoritative answer" bit is no longer there, as they are the authoritative DNS server for that domain name. How to find the authoritative source is interesting to know, but for all practical purposes, you will probably never have to do this manually as it all happens behind the scenes. See the [[Manual]] gethostbyname(3) to see how programs make this call in the background.
 
You can see the "Non-authoritative answer" bit is no longer there, as they are the authoritative DNS server for that domain name. How to find the authoritative source is interesting to know, but for all practical purposes, you will probably never have to do this manually as it all happens behind the scenes. See the [[Manual]] gethostbyname(3) to see how programs make this call in the background.
 +
 +
== DNS Transport ==
 +
 +
DNS is transported over [[TCP]] port 53 and/or primarily over [[UDP]] port 53.  Initially a length of 512 bytes was the maximum length of a UDP DNS packet.  This has changed with [[EDNS0]].  With TCP the maximum length of a DNS packet is 65535 bytes. TCP is primarily used for [[AXFR]] queries.
 +
 +
== A sample DNS answer ==
 +
 +
I took this from a packet dump ([[tcpdump]]) of a lookup of my domain, it shows in detail the individual sections inside a UDP DNS packet.
 +
 +
[[File:nsd-answer-centroid-eu.jpg]]
 +
 +
The nameserver that gave this reply is [[nsd]].  The domain looked up is somewhere in the [[centroid.eu]] zone.
 +
 +
== List of DNS Server Software ==
 +
 +
* [[BIND]]
 +
* [[nsd]]
 +
* [[wildcarddnsd]]
 +
 +
 +
== DNS used as DoS ==
 +
 +
DNS is increasingly used as [[DoS]].  Here are some solutions that could make DNS more DoS resistant.
 +
 +
* elegant DNS software rate limits queries from an arbitrary source to an arbitrary DNS record of arbitrary type.  Perhaps large memory footprints are needed for such a thing, but it's not 1987 anymore, it's 25 years later and RAM has become cheaper.
 +
 +
* TCP has never been explored as a resolver really, even though it's not impossible, it just requires better handling of stream based protocols in software.
 +
 +
I personally think DNS is the achilles heel of the Internet.

Latest revision as of 03:12, 31 March 2013

Intro

When you type "http://www.hackepedia.org" into the URL bar of your browser, you are using the Domain Name System (DNS). This makes things a little easier for us, considering things actually use IPs instead. It would be a lot more difficult to memorize http://64.111.114.195 which would actually be a little faster for you as then you don't have to resolve DNS, but then again, that IP could change so DNS makes things more easy.

DNS was explained in RFC 1034 and RFC 1035 written in 1987 and has many modifications, see RFC Index.

Distributed Database

DNS is a distributed database. It is build like a tree and does delegations from the root up to organization dns servers. Here is how a DNS tree would look like.

Dns.jpg

The tree set-up of delegating nameservers is intended to keep loads managable on the entire internet. If you have an organization named "skankyreggae" and wanted to be on the internet then you could take skankyreggae.tld as your domain name. The root would point to .tld and .tld would point to the nameservers serving skankyreggae. You can host skankyreggae on your own computers, by means of a DNS Server, provided they are reliably on the Internet all the time. When others seek skankyreggae.tld they would speak directly with your nameservers to get the IP of the www servers if they were seeking web. They would look up MX records if they tried to send mail to [email protected] and so on.

DNS is best explained in RFC's 1034 and 1035.

gTLD and ccTLD domains

These can be viewed here in the Root Zone database.


Resolving

Let's try and find out what the IP of hackepedia.org is at the time of writing this:

$ nslookup hackepedia.org
Server:         66.33.216.129
Address:        66.33.216.129#53
Non-authoritative answer:
Name:   hackepedia.org
Address: 64.111.114.195

This means we asked the DNS server 66.33.216.129 what IP hackepedia.org has. That server answered back, I'm not the authoriatative answer, but it was 64.111.114.195 last I checked. Why did we ask 66.33.216.129? Well, that is the first nameserver line in /etc/resolv.conf (On Windows it's under your TCP/IP properties in Network configuration). You can have up to three listed, and it will try them in order. If the first one isn't answering, it will try the second. If we don't get a reply from the 2nd, we'll try the third. You want to all of your DNS servers to be as few hops away from you as possible, as you can imagine, you make a lot of requests to them if you're an avid websurfer. If you're really impatient, you should look at running your own caching nameserver.

If there is too much output for you there, or you don't care which DNS server you're querying, you can use host instead of nslookup:

$ host hackepedia.org
hackepedia.org has address 64.111.114.195

But when we asked 66.33.216.129, it said it wasn't the authoritative answer.. out of curiousity, who is?

$ whois hackepedia.org | grep "Name Server"
Name Server:NS1.DREAMHOST.COM
Name Server:NS2.DREAMHOST.COM
Name Server:NS3.DREAMHOST.COM

If you don't include the | grep "Name Server" part, you will get a lot of other information about that domain, like who owns it, where they are located, contact information etc, although the whois information is often faked for privacy reasons.

Now we will ask NS1.DREAMHOST.COM what the ip is:

$ nslookup hackepedia.org ns1.dreamhost.com
Server:         ns1.dreamhost.com
Address:        66.33.206.206#53
Name:   hackepedia.org
Address: 64.111.114.195

You can see the "Non-authoritative answer" bit is no longer there, as they are the authoritative DNS server for that domain name. How to find the authoritative source is interesting to know, but for all practical purposes, you will probably never have to do this manually as it all happens behind the scenes. See the Manual gethostbyname(3) to see how programs make this call in the background.

DNS Transport

DNS is transported over TCP port 53 and/or primarily over UDP port 53. Initially a length of 512 bytes was the maximum length of a UDP DNS packet. This has changed with EDNS0. With TCP the maximum length of a DNS packet is 65535 bytes. TCP is primarily used for AXFR queries.

A sample DNS answer

I took this from a packet dump (tcpdump) of a lookup of my domain, it shows in detail the individual sections inside a UDP DNS packet.

Nsd-answer-centroid-eu.jpg

The nameserver that gave this reply is nsd. The domain looked up is somewhere in the centroid.eu zone.

List of DNS Server Software


DNS used as DoS

DNS is increasingly used as DoS. Here are some solutions that could make DNS more DoS resistant.

  • elegant DNS software rate limits queries from an arbitrary source to an arbitrary DNS record of arbitrary type. Perhaps large memory footprints are needed for such a thing, but it's not 1987 anymore, it's 25 years later and RAM has become cheaper.
  • TCP has never been explored as a resolver really, even though it's not impossible, it just requires better handling of stream based protocols in software.

I personally think DNS is the achilles heel of the Internet.