Phil Regnauld ccTLD workshop November Amman, Jordan

Slides:



Advertisements
Similar presentations
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Advertisements

School of Electrical Engineering and Computer Science, 2004 Slide 1 Autonomic DNS Experiment Architecture, Symptom and Fault Identification.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
DNS Session 4: Delegation and reverse DNS Joe Abley AfNOG 2006 workshop.
Introduction to the DNS AfCHIX 2011 Blantyre, Malawi.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
Recursive Server. Overview Recursive Service Root server list localhost in-addr.arpa named.conf.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 8: Managing and Troubleshooting DNS.
Hands-On Microsoft Windows Server 2003 Administration Chapter 9 Administering DNS.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Domain Name Services Oakton Community College CIS 238.
Linux Networking Commands
Domain Name System (DNS) Ayitey Bulley Session-1: Fundamentals.
DNS. Introduction What is DNS? –Hierarchy or Tree –Dot used as a separator.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
DNS Registries. Overview What is a DNS registry? –DNS registries –Data In –Data Out –Transactions Registry Structure –Registry –Registrars –Registrants.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Domain Name System HISTORY File hosts (the size of Internet became more than 1000.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
October 15, 2002Serguei A. Mokhov, 1 Intro to DNS SOEN321 - Information Systems Security.
DNS Related Commands Sayed Ahmed Computer Engineering, BUET, Bangladesh (Graduated on 2001 ) MSc, Computer Science, U of Manitoba, Canada
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Troubleshooting.
Security and Stability of Root Name Server System Jun Murai (From the panel on Nov. 13 th by Paul Vixie, Mark Kosters, Lars-Johan Liman and Jun Murai)
Module 5 BIND Configuration. named.conf – controls operational features Located - Linux: /etc/named.conf /etc/bind/named.conf Located- BSD: /usr/local/etc/named.conf.
Module 8 DNS Tools & Diagnostics. Objectives Understand dig and nslookup Understand BIND toolset Understand BIND logs Understand wire level messages.
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
© NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License.Creative Commons Attribution 3.0 Unported License Practicalities.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Module 6: Managing and Monitoring Domain Name System (DNS)
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
Domain Name System (DNS) Joe Abley AfNOG Workshop, AIS 2014, Djibouti Session 2: Resolver Operation and debugging.
A study of caching behavior with respect to root server TTLs Matthew Thomas, Duane Wessels October 3 rd, 2015.
Module 8 DNS Tools & Diagnostics. Dig always available with BIND (*nix) and windows Nslookup available on windows and *nix Dig on windows – unpack zip,
CIS 192B – Lesson 2 Domain Name System. CIS 192B – Lesson 2 Types of Services Infrastructure –DHCP, DNS, NIS, AD, TIME Intranet –SSH, NFS, SAMBA Internet.
Linux Operations and Administration
Configuration of Authoritative Nameservice AfCHIX 2011 Blantyre, Malawi (based on slides from Brian Candler for NSRC)
AfNOG-2003 Domain Name System (DNS) Ayitey Bulley
Web Server Administration Chapter 4 Name Resolution.
1 CMPT 471 Networking II DNS © Janice Regan,
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
ITU ccTLD Workshop March 3, 2003 A Survey of ccTLD DNS Vulnerabilities.
Domain Name System (DNS) Joe Abley AfNOG Workshop, AIS 2014, Djibouti Session-1: Fundamentals.
WHAT IS DNS??????????.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
AfNOG-2003 Domain Name System (DNS) Ayitey Bulley Setting up an Authoritative Name Server.
1 Lecture A.3: DNS Security r Domain Name Service r Security Problems in DNS.
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Session 3: Configuration of Authoritative Nameservice Joe Abley AfNOG 2013, Lusaka, Zambia.
Configuration of Authoritative Nameservice ccTLD workshop November th 2007 Amman, Jordan based on slides from Brian Candler for NSRC.
1 Internet Service DNS & BIND OPS335 Seneca College of Applied Technology.
Domain Name System (DNS) Ayitey Bulley extended by Phil Regnauld DNS Fundamentals AfNOG 2006.
Track E0 AfNOG workshop April Abuja, Nigeria Introduction to the DNS.
Phil Regnauld ccTLD workshop November Amman, Jordan DNS Operations.
1 CMPT 471 Networking II DNS © Janice Regan,
Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved
So You Inherited a DNS Server…
Domain Name System (DNS)
Introduction to the DNS
Domain Name System Tony Kombol ITIS 3110.
Module 5: Resolving Host Names by Using Domain Name System (DNS)
Database backed DNS.
IMPLEMENTING NAME RESOLUTION USING DNS
Configuring and Troubleshooting DNS
Configuration of Authoritative Nameservice
Data Communications and Networking DNS
DNS and Bind Presenter David Wood
Domain Name System Introduction And Overview
Presentation transcript:

Phil Regnauld ccTLD workshop November 26-29 2007 Amman, Jordan DNS Operations Phil Regnauld ccTLD workshop November 26-29 2007 Amman, Jordan

Goals Go beyond basic DNS administration, focus on service stability Identify common operational problems that plague authoritative nameserver administrators Identify pitfalls and errors to avoid when changing zones Define proper architectures Improve availability and reduce the chance of a breakdown of service using active monitoring

Overview Tools Gotchas and common debugging problems using dig and interpreting the results doc, dnstop Gotchas and common debugging problems RFC1912, 2182, 2870 delegation and glue, keeping it up to date inconsistent delegation between parent and child cache effects TTL policy

Overview Operations logging using BIND channels monitoring services and zone exports active delegation checking distributed hosting considerations scripting and automation

Tools – using dig dig is the domain information groper. dig is used to query nameservers for information, usually for debugging purposes. dig gives you information, and can perfom queries, that most other tools usually used (nslookup, host) don't give you dig's output can be confusing the first time one sees it...

Tools – using dig $ dig ns nsrc.org. ; <<>> DiG 9.4.1-P1 <<>> ns nsrc.org ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40659 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 2 ;; QUESTION SECTION: ;nsrc.org. IN NS ;; ANSWER SECTION: nsrc.org. 132391 IN NS ARIZONA.EDU. nsrc.org. 132391 IN NS RIP.PSG.COM. ;; ADDITIONAL SECTION: ARIZONA.EDU. 104458 IN A 128.196.128.233 RIP.PSG.COM. 89057 IN A 147.28.0.39 ;; Query time: 60 msec ;; SERVER: 212.38.128.2#53(212.38.128.2)‏ ;; WHEN: Tue Nov 27 02:58:37 2007 ;; MSG SIZE rcvd: 108

Tools – using dig Pay particular attention to the flags and the answer section Use dig at the authority of the parent and child zones to control proper delegation Do the informations match ? Example for cctld.eu.org Identify nameservers for EU.org dig ns eu.org.

Tools – using dig ;; ANSWER SECTION: eu.org. 23772 IN NS ns0.pasteur.fr. eu.org. 23772 IN NS ns.eu.org. eu.org. 23772 IN NS ns-slave.free.org. eu.org. 23772 IN NS dns3.gandi.net. eu.org. 23772 IN NS auth1.dns.elm.net. eu.org. 23772 IN NS relay-1.ftel.co.uk. eu.org. 23772 IN NS ns1.pasteur.fr. Ask one of the servers for the NS records for cctld.eu.org dig @ns.eu.org NS cctld.eu.org.

Tools – using dig ;; AUTHORITY SECTION: cctld.eu.org. 259200 IN NS NS1.CATPIPE.NET. cctld.eu.org. 259200 IN NS NS2.CATPIPE.NET. cctld.eu.org. 259200 IN NS NS1.cctld.eu.org. Notice the flags for the query, and the way the answers are presented Control that the servers for cctld.eu.org return the same information: dig @ns1.cctld.eu.org NS cctld.eu.org. What do you notice ?

Tools – doc Checking delegations manually is error-prone and tiresome A tool to automatize this particular check exists: doc Doc can be installed as a port/package Usage: doc [-p] domain.name

Tools – doc Try using doc – it should be installed. doc -p cctld.eu.org

Gotchas and common debugging problems Logging is the single most useful tool for troubleshooting a running nameserver – we'll see later how to set it up Check out RFC1912, 2182 and 2870 Lame delegations and glue problems can be easy to overlook if the wrong tools are used Caching makes this more complicated – problems might appear later. Pick a reasonable TTL policy

Gotchas and common debugging problems: caching Cache effects Changes can take a while to propagate – plan accordingly TTL and SOA policy RIPE has a document for recommended SOA values: ftp://ftp.ripe.net/ripe/docs/ripe-203.pdf example.com. 3600 SOA dns.example.com. admin.example.com. ( 1999022301 ; serial YYYYMMDDnn 86400 ; refresh ( 24 hours)‏ 7200 ; retry ( 2 hours)‏ 3600000 ; expire (1000 hours)‏ 172800 ) ; minimum ( 2 days)‏

Gotchas and common debugging problems: caching It's common to misinterpret/forget the negative value of the SOA ”negative” means ”how long can remember that the record for this query does NOT exist”

Operations remember to turn off recursion! logging monitoring service (availability and data)‏ active delegation checking hosting and architecture considerations

Logging Using BIND channels, categories and severities (chap 7.5 of DNS & Bind)‏ The idea is to define channels (file, syslog, ...) and the assign categories to these channels: logging { channel transfers { file ”log/transfers” versions 5 size 100M; print-time yes; }; category xfer-out { transfers; category default { default_syslog; default_debug;

Logging Categories of interest: default lame-servers load notify a good set of defaults – send it to your syslog lame-servers bad delegation load zone loading events notify zone change notifications queries logging of queries – can be huge! response-checks badly formed answerd, additional information, ... xfer-in / xfer-out events for incoming / outgoing zone transfers

Logging Add logging to /etc/namedb/named.conf, and restart named # rndc reconfig Do a zone transfer for a zone from one of your neighbors: # dig @ns.of.neighbor axfr zone.name Look at /etc/namedb/log/transfers # more /etc/namedb/log/transfers

Monitoring - services Monitoring services – why ? make sure that your nameserver is answering correct data, in a timely manner monitor secondaries monitor infrastructure to deliver DNS service (network, servers, ...)‏ Tools useful for monitoring: echoping – check service latency and availability SmokePing – graph of reponse times Nagios – service and server monitoring ... many others

Monitoring – zone exports Monitoring zone export – why ? Avoid publishing incorrect information Avoid publishing incomplete information (truncated zone)‏ Avoid disappearance of your zone! (undetected errors + expire of zone)‏ Checks zone change controls before AND after publication named-checkzone use EOD markers (data that your export script adds to the zone at the end of your zone export job zonevalid TXT ”exported at 20071126 09:54”

Monitoring – zone exports Undetected errors zone fails to load (invalid syntax or inconsistent – CNAME and other data for example)‏ no one notices 2-4 weeks later, the zone expires on the secondaries the zone has disappeared difficult to correlate the problem with the exact cause (unless one has logs)‏ Note that if ”rndc reload” is used, BIND will keep the old zone in memory if the new one fails validation

Monitoring - baseline Get to know your system Using tools such as dnstop, tcpdump, MRTG, establish a baseline for your platform when it is functioning normally Identify average queries per second memory usage for named

Monitoring - baseline Useful for capacity planning for future growth, and for handling attacks

Delegation checking Mostly a policy decision Proactive or reactive ? check regularly every delegation or check only when delegation changes But there are advantages avoid to field problem reports that are Not Your Problem (”domain XYZ doesn't work!”)‏ Some TLDs have a ”Name server registration” procedure.

Secondary considerations If you're not already doing it, then make sure your SOA server is a hidden master, not accessible from the rest of the network None of your public servers should serve any data that is unique/irreplaceable. Normally, all public servers are secondaries (but there are other methods, including secure copy)‏

Scripting and automation You should be familiar with at least one scripting language (Shell, Perl, Python, ...)‏ Automate as much as you can Run tools like doc, dig to control delegations for critical zones

Questions ? ?