Review of Mitigating DNS DoS Attacks

Size: px
Start display at page:

Download "Review of Mitigating DNS DoS Attacks"

Transcription

1 Review of Mitigating DNS DoS Attacks Tak-Lon Wu I433/I590 Research paper Computer Science Dept. Indiana University Bloomington, IN Introduction Abstract The Domain Name system (DNS) has become a ubiquitous part of modern internet infrastructure that maps numeric IP address to human-readable names. In the recent years, denial of service (DoS) attacks on DNS has a trend to be more serious problems. These attack is mainly related the hierarchical namespace architecture, which is hard to avoid as this architecture are widely deployment in multi-level approach. Therefore, researchers tend to solve this problem by changing its structure, configuring the original setting and enhancing the availability by augmenting its low-level DNS resolver. Such researches significantly improve the reliability and availability against that DoS attack. However, as the numerous solutions it has, there does not exist a standard way to achieve this problem. This paper gives a brief overview of DNS service, and review numerous recent researches tend to solve the DoS attack on DNS service. Internet has been widely used for almost 15 years. People are becoming abuse about internet and a part of daily life. One of the important components of internet is DNS service, which mainly converts the location information (IP address) to meaningful words. This service has become a ubiquitous part of daily computing such as connection information from a credit card machines to a bank s database, airport checking process

2 and other important daily life computing. As the more relies of this human-friendly service, it will be a disaster when this service is unable to function. Imaging numerous banks database or airport scheduling systems was unable to reach for 4 hours, this world probably will be mess up. [7,8,9] indicates a few denial of service (DoS) attack when a partial DNS service broken down. Especially, the case of [7] made the software kingdom, Microsoft.com, was unreachable for a day. DoS attack on DNS service become an unavoidable attack due to the publication of DNS service. Therefore, a large number of researches turn up in order to handle this problem. This paper is structured as follow. Section 2 review the background of a DNS generally operates and indicates a few DoS attacks. Section 3 illustrates the modern solution against DoS attacks. Section 4 focuses on the Mitigaing DNS DoS Attack [1]. And finally, section 5 and 6 gives briefly discussion and conclusion. 2. Background Review Domain name system (DNS) is now relied through the Internet Infrastructure, without the its support, the Internet will properly unable to function. Therefore, ensure this important service is running as the predicted situation becomes an essential issue. In this section, we introduce the hierarchical namespace structure of DNS, then indicate the common DoS attacks base on this structure, and finally give two examples of how researchers and companies face to these attacks. 2.1 DNS structure Root edu com gov mil org net uk cn... jp indiana... mit Microsoft Amazon. cs informatics chemistry Figure 1 DNS hierarchical namespace structure The basic idea of this naming service is to convert an IP address to a meaningful string such as to This string is processed from right to

3 left and use periods as separator, which first analyzes.edu, then Indiana.edu, and finally Such process operates based on the hierarchical namespace structure as shown in Figure 1. The DNS hierarchy can be visualized as a tree, where each nodes in the tree corresponds to a domain, and the leaves in the tree correspond to the hosts being named (e.g. indiana.edu, Microsoft.com, etc.). A domain is also known as zones such as.edu,.com, and.net construct a zones within Root node, and Indiana.edu, mit.edu and others (*.edu) belong to the zone of edu. On the top of the tree represents as the Root name server, which is the core of this hierarchical namespace. It initially only has few machines, which was 13 at first, to hold the information related the second level. But now, it might be duplicated in order to support redundancy. The second level maintains by a group of Top Level domain (TLD) servers, which mainly handle the IP location of where a name-server of Microsoft.com or indiana.edu is. Third level and other levels are commonly known as authoritative servers which are hold by Universities or companies. The servers within this hierarchical service closely communicate to each other in order to support name translation. Figure 2 an example of a DNS query Figure 2 shows the method that a user asks a DNS resolver (local name-server) to obtain a related IP address. There are numerous local name-servers (properly at third level or a more descendant level) to serve the DNS requests from local users. These local name-servers take the responsibility to obtain answers (positive and negative) to local users. Here, once a successful (positive) request is done, these servers will cache the response and give a time to live (TTL) value for each response. Once these TTL expire, such caches will no longer exist in Memory and need to run the whole process again in order to obtain a new cache.

4 In our case, a local user asks the IP of Note that we assume no such cache in the local server, which means it has to obtain a new result to the user. First, the resolver follow the order: first Root server (Root level), then.com TLD server, and then Indiana.edu name-server, and finally cs.indiana.edu name-server. As can been seen, the operation follows the DNS hierarchy that each level s server stand as an important role. However, the more high level of this model (especially Root and TLD level), the fewer servers serve the requests. As a result, attackers focus on this special architecture and tend to deny this important internet infrastructure. The following section will briefly describe how a Denial of service (Dos) attack achieves underlying the DNS model. 2.2 DoS Attacks on DNS Denial of service (DoS) or Distributed Denial of service DDoS is one of common computer system attacks which main purpose makes a machine, service, system or other essential components of a computer system to be unavailable. In fact, DNS service is facing with DoS attack every day. One of the reasons is that DNS acts as a public service to serve all the internet users. Also, due to the hierarchical model which has fewer servers to deal with the requests on a higher level, attacker aims to deny legal user to obtain a DNS result from the higher level service (Root and TLD). The assets might vary from the attackers, but normally, a DoS attack. The method of such attack is obviously general and easy to understand. Having the characteristic of fewer servers on the higher level, attackers just need to overload those servers and cause other local name-servers unable to function as the target servers are too slow to answer the requests. Once this situation achieved, the whole target zones (e.g. Microsoft.com, Indiana.edu) are unable to reach as users cannot obtain a correct DNS response. Over the past ten years, there are numerous cases suffering from this DoS attack. According to the [7], in 2001, the Microsoft.com s (including MSN.com and other related sub-zones) network was unreachable due to the DNS attack. The duration was almost a day, and the engineers of Microsoft took a four-hour check to investigate the problem. At that moment, the company even contacted to FBI. And finally, they found out the reason might due to the changing a new router configuration, which opened the holes of the firewall to the long-term attackers. Note that the case of Microsoft does not only blame the attackers, but also related to the misconfiguration of the router and lack of backup DNS mirrors when the main service failed. In addition, another significant fault was all the DNS servers were on the same Network at that time. [8] and [9] also aware the DNS administrators that DoS on DNS service are now focusing on the root and TLD server, not only a DNS resolver. There was no DoS attack to the root server in 1990s [8]. However, as information technology grows rapidly and computer knowledge becomes a more common sense to people, such attacks cannot be avoided. Therefore, a large number of researches tend to come up with this unavoidable problem. Next section will gives some examples related to DoS attack on DNS.

5 3. DoS on DNS Research As DoS attacks on DNS are unavoidable, there are a huge amount of researches try to mitigate this problem. Such researches can be classified as three kinds of solution: redesigns the DNS architecture, changes the original configuration with new mechanism, and adds new mechanism to the original structure. In this section, we will briefly introduce these three scenarios, and Section 4 will mainly give a detail example the third method. 3.1 Re-designs the DNS architecture The mechanism proposed by T.Deegan et. al. [2] is one of the representative methods to re-design the DNS hierarchical architecture. T.Deegan et. al. [2] does not only mention how to enhance the availability against DoS attack, but also suppose the new design is reliable and can achieve a high performance. The idea of this mechanism is simple, which try to replace all the authoritative servers (including Root, TLD, and third level) with a single centralize database. This database is served by a small number of well-provisioned and well-placed servers. Obviously, comparing to the original DNS service, this method is trying to reduce the multiple communications between a resolver and the higher level name-servers. According to T.Deegan et. al. [2], there are several reasons to changes the architecture. First the Lookup latency, as the original DNS takes several steps to obtain the final result, each step has a interact delay. Once a heavy lookup comes in, the delays will increase as there are few high-level name-servers could answer the queries. Second is the administrative complexity. Although the multiple level administrative policies give the DNS services autonomy, it increases the lack of communication between different zones administrator, thus resulting delegation errors. The last but not least, the vulnerability of DoS, which act as a special case of point one. The default implementation of DNS service suggests that a zone should be served with more than 2 name-servers Figure 3 [2] (a) original DNS architecture (b) a centralize database DNS architecture

6 against unavailability. However, there are many low-level zones operated with only 2 name-servers due to the cost of hardware. As a result, it is easily suffered from a DNS DoS attack. Figure 3(b) illustrates the basic idea of this centralize mechanism. They replace the all upper level name-servers (server side) expect the resolver with a large-scale, closely connected authoritative servers; meanwhile, the client side user do the same as the original DNS service. As large-scale distributed system, Grid computing and Clouding computing are widely used to achieve high performance, availability and reliability services. This single centralize database mechanism likely share the same advantages with such services. The main problem with this database is properly the same as a large-scale distributed database, which need to keep consistent between different nodes. Once this re-centralized mechanism achieved, the multi-level DoS against DNS can be solved. Moreover, it also can set rules to mitigate other attack as it is a centralized service. 3.2 Change the original configuration DoS attack on DNS always tends to deny the Root and TLD name-servers with the scenario that there are no such caches in memory. The reason that a DNS resolver does not have such record is always due to the short TTL time [3]. According to the original DNS designer, Mockapetris, indicated that The administrator defines TTL values for each resource record [RR] as part of the zone definition; a low TTL is desirable in that it minimizes periods of transient inconsistency, while a high TTL minimizes traffic and allows caching to mask periods of server unavailability due to network or host problems. After the first draft of [3], V.Pappas et. al. [4] proposed a method to enhance the DNS resilience with a reasonable TTL modification. The original DNS service aims to use short TTL values to provide an accurate answer. Such TTLs would not be longer than few hours, and it might cause a frequently refresh of the related record. Here, too frequent refresh of such record will probably cause Denial of Service. Therefore, V.Pappas et. al. [4] supposes to use longer TTLs to provide a more reliable DNS service. In practice, all the RRs that belong to a zone are available from a set of DNS server called authoritative name-servers for such zone. All this authoritative name-servers are identified by a Name-server (NS) record, which is a string. Such NS record need an A-record (IP address) to contact an authoritative nameserver (zone), and the set of this record are name as infrastructure resource records (IRR) [4]. This IRR is stored in cache after a query search the related zone for once. For example, one searches then that resolver will store the IRR of Indiana.edu. And the second time when some others ask the same zone or subzone (e.g. ) will not send a request to the root server for asking where the.edu and indiana.edu located. In other word, it can directly connect to the target name-server and reduces traffic to the root server. Some TLD name-servers, which directly below the Root level name-server, have IRRs with relatively TTL values. This mechanism is due to the few number of Root server need to be protected. However, many zones below TLD level have a short TTL for such IRRs. During the DoS attack, the re-

7 quests that send to the root or TLD service are potentially causing a time-out. At that time, user cannot get any information from the DNS resolver. But, if the resolver has a longer TTL of IRRs, some of these requests might able to answer as there is such related information. This idea is simple, however, once the TTL of IRRs increase, it might cause an indefinitely memory problem. Therefore, defining how long a IRR is kept and how to solve the memory problem are important. V.Pappas et. al. [4] introduces three critical ideas: TTL refresh, TTL Renewal and Long TTL. First, TTL refresh means when subzones of a zone need to be asked, and if there is a cache of the IRRs, the resolver refreshes the TTL (detetmine by the new request) after the request finishes. This refresh keeps popular IRRs alive in the cache. As an IRR might expire before TTL refresh, TTL Renewal can renew the IRR before that IRR ready to expire. A certain credit c which defines the number of times a IRR could be renewed after it has expired. There different way to increase the credit c, but this credit mainly decreases by one when each time the IRR expires. And the last suggestion is long TTL, it could be thought as the combination of TTL refresh and TTL Renewal. However, once the IP address of that authoritative name-server has changed, this TTL is useless. But due to the IRR represent the high-level name-server, they seldom change the IP address. 3.3 Add new mechanism to the original structure DNS service is now widely used by internet users; it also stands as a symbol modern naming system. Numerous researches tend to keep this infrastructure and add new mechanisms to face the common DoS attack. One of the researches is proposed by K. Park et. al. [5], a CoDNS which improves the performance and reliability against DoS attack via a Cooperative queries Lookup. First, it has to identify two parts of server, a server-side and client-side. A serverside server means the high-level server (Root, TLD), a client-side server means the local Figure 4 a basic example of CoDNS

8 DNS resolver. As a DoS attack always make a local DNS resolver timeout from the serverside servers, a local DNS resolver will meet a situation that is unable to answer the queries. K. Park et. al. [5] suggest to keep the server side sever, but having a small change to the client-side server. They build a trusted, closed and fast peer network with several local DNS resolver to construct a Content Distributed Network (CDN). CDN is widely used by video media such as CNN.com and youtube.com., and the benefit of this approach to DNS will share the ideas of availability and high performance. In other word, content of a DNS record will separate through this small network. Once one of these peers is experiencing a problem, it starts up the CoDNS mechanism to forward the name lookup to its entire neighbor until a response returns. The main problem of this idea is building such trust-connected environment increase the system complexity. That means it has to include a trust mechanism to this peer network, and must rely on each peer. Otherwise, if one of the peers is compromised, the trust connection will dissolve. According to the implementation, this CoDNS is started as a background service. Once an event of local DNS resolver is slow which a certain period of waiting with a normal query, this CoDNS service will immediately operate and send a forward lookup to its peer. The remote lookup queries return dynamically, and the duration depends on the response time of its peers. Before sending the first remote query, there is an initial delay and this delay is adjusted based on the health state of a related DNS resolver. Once if the past 32 query are all resolved without using any forwarding lookup, it set as an initially delay of 200ms. This value is chosen as twice of a normal DNS query delay which does not exceed 100ms generally. And if the peer query win more than 50% of the last 60 request, the delay of forward set to 0ms, which means it immediately forward the query to its peer. This approach could enhance the single resolver of the traditional DNS client-side, and the experiment shows the ability to mitigate the unavailability during the DoS attack. Figure 4 shows the architecture of this mechanism. 4. Mitigating of DNS DoS attack According to the previous section, we see that a DNS flooding attacks certainly causes a DoS attack making a DNS service unable to serve the normal function. Focusing on the rule that does not change the infrastructure, this section will describe a detail research to conquer the DoS attack. This method assumes a situation happened only during a DoS attack, and it will only function when such situation occurs. Such assumption make the original DNS service keep the general operation, and create a crisis mechanism to deal with the attack. Figure 5 shows a Traversal fails which always occurs in DoS attack. Such scenario has been discussed in the previous section. Once again, this fails causes by the short TTL in cache, and needs to retry the whole process to obtain an appropriate result. As the network traffic increases, the more timeout will eventually break down the DNS service. Based on this problem, H. Ballani and P. Francis [1] try to use a stale cache to improve the availability when such Traversal fails (DoS) occurs. A stale cache is a group of cached, expired records which a Local DNS resolver has evicted in cache and is ready to expunge.

9 Figure 6 shows an example of this mechanism. With the familiar idea as V.Pappas et. al. [4], it stores the IRR of a zone in order to reach a cached subzone when the TLD server cannot be connected. This stale cache is an individual component new to the DNS structure, and it is easy to approach. As can been seen, the process in Figure 6, step 4 is the Figure 5 a Traversal fails in general DNS time that the DNS resolver cannot communicate to the TLD name-server (probably a DoS attack). Therefore, it tries to scan the stale cache if a cache hit could be found. In our case, the stale cache has the result of the name-server (NS) of Indiana.edu, and fortunately the NS of Indiana.edu does not change. Note that if stale cache does not evict such record or the NS of Indiana.edu has changed, this mechanism is still unhelpful. But according to the paper [1], the latter case has a small possibility to happen. Therefore, with former case, it conducts some important issue: when this stale cache update, how long it evict a record, and how it can be store within the resolver. First of all, this cache is updated when the normal cache get a result from the high-level name-server. This result is either positive or negative, e.g. a domain no longer exists. It ensures the record store in the stale cache is up to date. Second, it is hard to Figure 6 an example of Stale cache hits

10 determine the TTL of a stale cache due to the thousand of zones has a different population. But they provide an evaluation that the longer TTL as a stale cache stores, the higher cache hits it is served. And it seems like 14-day stale cache (with 79.6% of queries can be answered) is a bottleneck to this mechanism, as the more days stale cache only have a few percentage increases. And finally, a 30 days stale record uses < 313 MB with almost 2,700,000 cache record. The statistic indicates that this mechanism does not use much memory to store the record; therefore they suggest using memory for storing the stale cache as today s strong hardware support. 4.1 Pros The advantage of using this mechanism obviously is the availability. The main purpose of this method is to answer the query during a high-level name-server is attacked. It assumes previous queries has recorded in the stale cache, and a DoS flooding attack appears, this modification ensures that a resolver can respond for that zone as that zone s authoritative name-servers are unavailable during DoS attack. It enhances the DNS robustness with a lightweight change. In addition, the other beauties of this mechanism are that it does not change the original DNS structure, and only functions when a query is failed with a traversal fail. These two conditions do not involve any overhead to the DNS resolver, even if the caching behavior has been modified. 4.2 Cons Meanwhile, there is a significant minor point of this mechanism. It is certainly a big trouble to the service, which the using the previous cache as answer to internet user. If a zone or such stale record has change its IP address or currently unreachable to public during this mechanism is running, it probably will answer the user with an incorrect result. At that time, user still needs to resend the query and suffers from the DoS attack. Therefore, the using of stale cache is a Double-edged sword. But, other researches mentioned in [1] prove that the name-to-ip mappings tend to be stable with less than 2% of changing the IP address more than once a week, that means such scenario happen with a small probability. In addition, once the attackers learn this mechanism, they might keep track the record and figure out which zone might not be cache in the stale cache. After they know such situation, a DoS attack is still vulnerable to this system. In sum, this mechanism has a main benefit of its simple idea which just utilizes the previous caches to provide available service during a DoS attack, however, once the attacker learn the concept of this mechanism, it will easily conquer the new modification. Also, as it does not change the DNS architecture, it shares the disadvantages of the original DNS such as high latency when a new query asked during the DoS attack. That means vulnerability still exists, but a different scenario. 5. Discussion Obviously, the current DoS attack on DNS is due to the hierarchical architecture. So, the method that changes the current DNS structure could significantly solve this

11 problem. However, whenever a new system approaches, numerous problems will follow. Also, with changing a human abuse service, it takes time to get used to a new mechanism even though such service is perfectly designed. One significant advantage of T.Deegan et. al. [2] s project is that they only change the server-side architecture, the setting of that layer of are always maintained by a group professional administrators. Normal user or DNS resolver does not need to worried about how they change the behind infrastructure. Meanwhile, such mechanism will cause a lack of autonomy and increase the complexity. The second approach [4] tends to use the characteristic of current DNS service by changing the TTL values of the IRRs record. Such mechanism is good and easily achieve. The only problem is certainly related to the extended memory size, even if current system can accepted such increase, it still need to reduce the memory size in order to provide a DNS-like process. Third, CoDNS [5] suppose to use a CDN-like mechanism to provide a trust, lightweight, high performance, and better availability service. However, having a trust environment is hard to determine by simple policies although it does not concentrate much on the paper. Finally, the stale cache resolver [1] apparently has a similar idea to CoDNS [5]. They share the same idea that only changes the resolver in order to fight against the DoS attack, and it is important that they do not change the original structure. But the only difference is the latter involves resolvers cooperating together to achieve a more reliable service, meanwhile, the former use the local storage to insure themselves against DoS on DNS. 6. Conclusion This paper presents a clear review of the DNS hierarchical architecture. The hierarchical architecture with fewer name-servers causes significant DoS attacks commonly occur underlying this infrastructure. Therefore, different researches such as redesigning a new architecture to DNS service, applying small configuration of current DNS service, and adding a mechanism based on the current DNS structure are widely discussed in order to protect this indispensable service. And till now, no one can dominate this field due to the daily, important usage to internet deeply influences internet user can only rely on this public and old fashion mechanism. However, this mechanism might still use for several years and even more than 5 years until someone eventually make a brand new, a more safe and more efficient naming service. In sum, all the above methods we have shown can mitigate the DoS attack on DNS service. Even though there are more solutions to the current DNS infrastructure, it is better to investigate new mechanisms to replace this service, as this service is widespread known and frequently attacker by attackers. Reliability, availability cannot be trusted with this sense. Such new mechanisms either change the server-side or clientside will be still valuable. Moreover, the idea of CoDNS [5] and H. Ballani et. al. seems can be combined together. With the reliable CDN peer network supported by CoDNS and the lightweight implementation provided with stale cache, it might able to construct a more reliable and reachable service.

12 References [1] H. Ballani, and P.Francis, Mitigating DNS DoS Attacks, Proceedings of the 15th ACM conference on Computer and Communications Security (CCS), pp , [2] T. Deegan, J. Crowcroft, and A. Warfield, The Main Name System: An Exercise in Centralized Computing, SIGCOMM Comput. Commun. Rev., vol. 35, no. 5, [3] V. Pappas, B. Zhang, E. Osterweil, D. Massey, and L. Zhang, Improving DNS Service Availability by Using Long TTLs, draft-pappas-dnsop-long-ttl-02, June [4] V. Pappas, D. Massey, and L. Zhang, Enhancing DNS Resilience against Denial of Service Attacks, in Proc. of Conference on Dependable Systems and Networks (DSN), [5] K. Park, V. Pai, L. Peterson, and Z. Wang, CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups, in Proc. of USENIX OSDI, [6] L. Peterson, and B. Davie, Computer Network : A System Approach, 4 th ed. Elsevier Inc : San Francisco, 2007, pp [7] Microsoft DDoS Attack, NetworkWorld, Jan 2001, [8] Root Server DDoS Attack, RIPE Mail Archive, Nov 2002, [9] Blue Security Kicked While It's Down, Washington Post, May 2005, s_but_s.html

Mitigating DNS DoS Attacks

Mitigating DNS DoS Attacks Mitigating DNS DoS Attacks Hitesh Ballani and Paul Francis Cornell University ACM CCS 2008 DoS attacks on DNS Attack: Flood the nameservers of a DNS zone Goal: Disrupt the resolution of The zone s resource

More information

Security in Grid Computing

Security in Grid Computing Security in Grid Computing Tak-Lon Wu B534 project 3 Computer Science Dept. Indiana University Bloomington, IN 47405 taklwu@indiana.edu 1. Introduction Abstract Over last 10 years, security one of the

More information

Mitigating DNS DoS Attacks

Mitigating DNS DoS Attacks Mitigating DNS DoS Attacks Hitesh Ballani Cornell University Ithaca, NY hitesh@cs.cornell.edu Paul Francis Cornell University Ithaca, NY francis@cs.cornell.edu ABSTRACT This paper considers DoS attacks

More information

Operational Implications of the DNS Control Plane

Operational Implications of the DNS Control Plane Operational Implications of the DNS Control Plane Eric Osterweil VeriSign Labs eosterweil@verisign.com Danny McPherson VeriSign Labs dmcpherson@verisign.com May 31, 2011 Lixia Zhang UCLA lixia@cs.ucla.edu

More information

The Domain Name System (DNS) Jason Hermance Nerces Kazandjian Long-Quan Nguyen

The Domain Name System (DNS) Jason Hermance Nerces Kazandjian Long-Quan Nguyen The Domain Name System (DNS) Jason Hermance Nerces Kazandjian Long-Quan Nguyen Introduction Machines find 32-bit IP addresses just peachy. Some Computer Science majors don t seem to mind either Normal

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs Naming and the DNS Focus How do we name hosts etc.? Application Presentation Topics Session Domain Name System (DNS) Email/URLs Transport Network Data Link Physical Ldns.1 Names and Addresses 43 name address

More information

Enhancing DNS Resilience against Denial of Service Attacks

Enhancing DNS Resilience against Denial of Service Attacks Enhancing DNS Resilience against Denial of Service Attacks Vasileios Pappas T.J. Watson Center IBM Research vpappas@us.ibm.com Dan Massey Computer Science Department Colorado State University massey@cs.colostate.edu

More information

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997 Network Working Group Request for Comments: 2182 BCP: 16 Category: Best Current Practice R. Elz University of Melbourne R. Bush RGnet, Inc. S. Bradner Harvard University M. Patton Consultant July 1997

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?

DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

NET0183 Networks and Communications

NET0183 Networks and Communications NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many

More information

DNS and BIND. David White

DNS and BIND. David White DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS FALL 2011 Lecture 19: DNS Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Human Involvement

More information

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. First Edition THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To

More information

Domain Name System. CS 571 Fall 2006. 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved

Domain Name System. CS 571 Fall 2006. 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved Domain Name System CS 571 Fall 2006 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved DNS Specifications Domain Names Concepts and Facilities RFC 1034, November 1987 Introduction

More information

How To Understand The Power Of A Content Delivery Network (Cdn)

How To Understand The Power Of A Content Delivery Network (Cdn) Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation

More information

A Comparative Study of the DNS Design with DHT-Based Alternatives

A Comparative Study of the DNS Design with DHT-Based Alternatives A Comparative Study of the DNS Design with DHT-Based Alternatives Vasileios Pappas Computer Science Department UCLA Email: vpappas@cs.ucla.edu Dan Massey Computer Science Department Colorado State University

More information

Georgia College & State University

Georgia College & State University Georgia College & State University Milledgeville, GA Domain Name Service Procedures Domain Name Service Table of Contents TABLE OF REVISIONS... 3 SECTION 1: INTRODUCTION... 4 1.1 Scope and Objective...

More information

Introduction to Network Operating Systems

Introduction to Network Operating Systems As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the

More information

Understand Names Resolution

Understand Names Resolution Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

DNS Basics. DNS Basics

DNS Basics. DNS Basics DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS

More information

DNS Domain Name System

DNS Domain Name System DNS Domain Name System Domain names and IP addresses People prefer to use easy-to-remember names instead of IP addresses Domain names are alphanumeric names for IP addresses e.g., neon.cs.virginia.edu,

More information

Introduction to the Domain Name System

Introduction to the Domain Name System CHAPTER 14 The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses),

More information

DNS Domain Name System

DNS Domain Name System Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.

More information

DNS and E-mail Interface User Guide

DNS and E-mail Interface User Guide DNS and E-mail Interface User Guide Document Revision 04 // 2012 www.twcbc.com back back to TOC to TOC Header Text and Info Table of Contents 1. Introduction 3 2. Accessing the Application 4 3. Working

More information

Domain Name System DNS

Domain Name System DNS CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Internet-Praktikum I Lab 3: DNS

Internet-Praktikum I Lab 3: DNS Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Domain Name Server. Training Division National Informatics Centre New Delhi

Domain Name Server. Training Division National Informatics Centre New Delhi Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations

More information

- Domain Name System -

- Domain Name System - 1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize

More information

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, www.nic.net.sa. DNS & IPv6.

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, www.nic.net.sa. DNS & IPv6. DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports

More information

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple

More information

Understanding DNS By Robert Sterler

Understanding DNS By Robert Sterler Understanding DNS By Robert Sterler DNS is a locator service and stands for Domain Naming System. DNS provides a mechanism for locating computers either by friendly name or IP address. DNS is an integral

More information

DNS Appliance Architecture: Domain Name System Best Practices

DNS Appliance Architecture: Domain Name System Best Practices WHITEPAPER DNS Appliance Architecture: Domain Name System Best Practices A Practical Look at Deploying DNS Appliances in the Network to Increase Simplicity, Security & Scalability Cricket Liu, Chief Infrastructure

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: DNS Delegation How To Guide DNS Delegation (The Simple Redundancy Solution) The key requirement when performing DNS based network redundancy and load

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

The Domain Name System (DNS)

The Domain Name System (DNS) The Domain Name System (DNS) Each Internet host is assigned a host name and an IP address Host names are structured character strings, e.g., www.cs.iastate.edu IP addresses are 32 bit integers, e.g., 129.186.3.6

More information

The Domain Name System

The Domain Name System Internet Engineering 241-461 Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu

More information

Introduction to DNS CHAPTER 5. In This Chapter

Introduction to DNS CHAPTER 5. In This Chapter 297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe

More information

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all

More information

Application Protocols in the TCP/IP Reference Model

Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management WWW Virtual Terminal Name Service File Transfer HTTP FTP Telnet SMTP DNS SNMP TFTP Internet protocols TCP UDP

More information

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved. Object Storage: A Growing Opportunity for Service Providers Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction For service providers, the rise of cloud computing is both a threat

More information

Copyright 2012 http://itfreetraining.com

Copyright 2012 http://itfreetraining.com This video looks at how the DNS name space is broken up and divided between servers. This allows the DNS name space to be controlled while still allowing individual administrator to have the power to make

More information

CS3250 Distributed Systems

CS3250 Distributed Systems CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted

More information

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication

More information

Domain Name System. 188lecture12.ppt. Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo

Domain Name System. 188lecture12.ppt. Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo Domain Name System 88lecture2.ppt Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo S-38.88 - Computer Networks - Spring 2003 Outline What and why? Structure of DNS Management of Domain Names Name Service in

More information

Distributed DNS Troubleshooting

Distributed DNS Troubleshooting Distributed DNS Troubleshooting Vasileios Pappas UCLA Computer Science vpappas@cs.ucla.edu Patrik Fältström Cisco Systems paf@cisco.com Daniel Massey Colorado State University massey@colostate.edu Lixia

More information

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP

More information

Chapter 23 The Domain Name System (DNS)

Chapter 23 The Domain Name System (DNS) CSC521 Communication Protocols 網 路 通 訊 協 定 Chapter 23 The Domain Name System (DNS) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Names For Machines 3. Flat Namespace 4. Hierarchical Names 5.

More information

Naming vs. Locating Entities

Naming vs. Locating Entities Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

The Importance of a Resilient DNS and DHCP Infrastructure

The Importance of a Resilient DNS and DHCP Infrastructure White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems The Importance of DNS and

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without

More information

Lightweight DNS for Multipurpose and Multifunctional Devices

Lightweight DNS for Multipurpose and Multifunctional Devices IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar

More information

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 22. Naming Paul Krzyzanowski Rutgers University Fall 2013 November 21, 2013 2013 Paul Krzyzanowski 1 My 15 MacBook Pro The rightmost computer on my desk Paul s aluminum laptop, but

More information

Managing Name Resolution

Managing Name Resolution 3 CHAPTER THREE Managing Name Resolution Terms you ll need to understand: Windows Internet Naming Service (WINS) WINS Proxy Agent LMHOSTS Tombstoning Persistent Connections Push/pull partner Hostnames

More information

Naming. Name Service. Why Name Services? Mappings. and related concepts

Naming. Name Service. Why Name Services? Mappings. and related concepts Service Processes and Threads: execution of applications or services Communication: information exchange for coordination of processes But: how can client processes (or human users) find the right server

More information

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Voichiţa Almăşan and Iosif Ignat Technical University of Cluj-Napoca Computer Science

More information

INTERNET DOMAIN NAME SYSTEM

INTERNET DOMAIN NAME SYSTEM INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download

More information

ECE 4321 Computer Networks. Network Programming

ECE 4321 Computer Networks. Network Programming ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet

More information

Implementing Domain Name Service (DNS)

Implementing Domain Name Service (DNS) Implementing Domain Name Service (DNS) H C A 1 P T E R ITINERARY Objective 1.01 Objective 1.02 Objective 1.03 Install and Configure DNS for Active Directory Integrate Active Directory DNS Zones with Existing

More information

IPv6 support in the DNS

IPv6 support in the DNS IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of

More information

IP Address Management and DNS Management

IP Address Management and DNS Management IP Address Management and DNS Management A white paper by Incognito Software February, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 5 Automated IPAM for Risk Management...2 The Complete

More information

Domain Name System Richard T. B. Ma

Domain Name System Richard T. B. Ma Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg

More information

Reducing the impact of DoS attacks with MikroTik RouterOS

Reducing the impact of DoS attacks with MikroTik RouterOS Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP

More information

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu

More information

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2

More information

Domain Name System (DNS)

Domain Name System (DNS) Lab Objectives Domain Name System (DNS) Acquiring skills related to the Domain Name System (DNS) functions Practical studying of DNS protocol in the process of its functioning Background Information DNS

More information

DnsCluster: A networking tool for automatic domain zone updating

DnsCluster: A networking tool for automatic domain zone updating DnsCluster: A networking tool for automatic domain zone updating Charalambos Alatas and Constantinos S. Hilas * Dept. of Informatics and Communications Technological Educational Institute of Serres Serres,

More information

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming Names & Addresses CS 9: Distributed Systems: Naming Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 970-77 What is a?

More information

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014.

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014. Application Layer Mahalingam Mississippi State University, MS September 15, 2014 Outline 1 DNS Records DNS Components 2 Message Transfer Fetching Emails 3 Applications We will focus on 3 applications DNS

More information

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12 DNS Computer networks - Administration 1DV202 DNS History Who needs DNS? The DNS namespace How DNS works The DNS database The BIND software Server and client configuration The history of DNS RFC 882 and

More information

WHITE PAPER. DNS: Key Considerations Before Deploying Your Solution

WHITE PAPER. DNS: Key Considerations Before Deploying Your Solution WHITE PAPER DNS: Key Considerations Before Deploying Your Solution TABLE OF CONTENTS What is DNS?... 2 Why Does DNS Matter?... 2 Options for building a DNS infrastructure... 3 How to Choose the Right DNS

More information

Milestone Federated Architecture TM

Milestone Federated Architecture TM White paper Milestone Federated Architecture TM Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit, Milestone Systems Date: June 22, 2015 Table of Contents Introduction...

More information

The Internet Domain Name System

The Internet Domain Name System The Internet Domain Name System Hari Balakrishnan 6.829 Fall 2002 Goals DNS architecture How DNS works DNS uses Mail Content Distribution Networks (CDNs) DNS Performance How well does it work? Why does

More information

IPv6 Support in the DNS. Workshop Name Workshop Location, Date

IPv6 Support in the DNS. Workshop Name Workshop Location, Date IPv6 Support in the DNS Workshop Name Workshop Location, Date Agenda How important is the DNS? DNS Resource Lookup DNS Extensions for IPv6 Lookups in an IPv6-aware DNS Tree About Required IPv6 Glue in

More information

Outline. Definition. Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP. Names, Identifiers and Addresses

Outline. Definition. Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP. Names, Identifiers and Addresses Outline Definition Names, Identifiers and Addresses Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP CS550: Advanced Operating Systems 2 A name in a distributed system is

More information

Lab - Observing DNS Resolution

Lab - Observing DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

Cisco NetFlow Reporting Instruction Manual Version 1.0

Cisco NetFlow Reporting Instruction Manual Version 1.0 Cisco NetFlow Reporting Instruction Manual Version 1.0 WiredCity 777 Davis St, Suite 250 San Leandro CA 94577 Ph: + 1 510 297 5874 Fax: +1 510-357-8136 itmonitor@wiredcity.com www.wiredcity.com www.wiredcity.com

More information

6.033 Computer System Engineering

6.033 Computer System Engineering MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.033 Lecture 3: Naming

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In) DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is

More information

IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy. and of course there can be sub-sub-!!

IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy. and of course there can be sub-sub-!! The Domain Hierarchy IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy the general form for a fully qualified name is and of course there can be sub-sub-!! -sub-domains

More information

Performance Optimization Guide

Performance Optimization Guide Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating

More information

The Domain Name System

The Domain Name System DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),

More information