Faster Updates for DNS Root Servers Arrive 150
Tee Emm writes "VeriSign's DNS Rapid Update notice period (as announced on NANOG mailing list) expires today. Beginning September 9, 2004 the SOA records of the .com and .net zones will be updated every 5 minutes instead of twice a day. The format of the serial number is also changing from the current YYYYMMDDNN to a new one that depicts the UTC time." We first mentioned this back in July, but it's finally launching now.
Re:hmm, but is this really a good thing? (Score:5, Informative)
Re:dynamic dns (Score:5, Informative)
The catch of course is that you have to be running bind locally to make it work. Which is fine if you're a unix-head and know how to work dns, but for the average joe, it's far from simple. I have a perl script that checks my Linksys firewall's IP every half hour, and if it's changed, updates the dns file, then runs nsupdate.
Re:For all registrars, or just some? (Score:3, Informative)
Anyone have further input?
Re:hmm, but is this really a good thing? (Score:5, Informative)
On the day before you move, your TTL can be dropped to this 5 minutes so your address can be changes with minimal disruption. After the move, once your stable, your TTL can be increased once again, and network congestion is minimalised.
Of course, I could be talking out of my arse, one of you lot will put me right if this is the case.
Re:Emergency use (Score:2, Informative)
this just helps if you want to switch nameservers within 5 mins
on top of that if you have a standby box bring it online with the old ip
Re:Emergency use (Score:5, Informative)
Re:Emergency use (Score:3, Informative)
Happened to me with my vanity domain when afraid.org was cut off for about 8 hours due to abuse issues. His upstream provider cut him off due to spammers hosting DNS there and he had to take steps to get back online. Meanwhile, my domain was unresolvable. I ended up putting up secondaries to prevent this from happening again.
Re:Emergency use (Score:5, Informative)
The record in a DNS root server never is meant to identify your web server, it's meant to indentify your primary and secondary DNS server, and it's those servers that work for you (or at least the ISP you work with) to identify your web server.
So, if you want fallover if your main web server goes down, you just need to update your local DNS record, not the one at the root servers. It's when your DNS servers explode that the five-minute updates would be helpful.
In case of slashdot effect... (Score:5, Informative)
* From: Matt Larson
* Date: Wed Jan 07 17:49:43 2004
VeriSign Naming and Directory Services will change the serial number
format and "minimum" value in the
or shortly after 9 February 2004.
The current serial number format is YYYYMMDDNN. (The zones are
generated twice per day, so NN is usually either 00 or 01.) The new
format will be the UTC time at the moment of zone generation encoded
as the number of seconds since the UNIX epoch. (00:00:00 GMT, 1
January 1970.) For example, a zone published on 9 February 2004 might
have serial number "1076370400". The
be generated twice per day, but this serial number format change is in
preparation for potentially more frequent updates to these zones.
This Perl invocation converts a new-format serial number into a
meaningful date:
$ perl -e 'print scalar localtime 1076370400'
At the same time, we will also change the "minimum" value in the
and
to 900 seconds (15 minutes). This change brings this value in line
with the widely implemented negative caching semantics defined in
Section 4 of RFC 2308.
There should be no end-user impact resulting from these changes
(though it's conceivable that some people have processes that rely on
the semantics of the
zones are widely used and closely watched, we want to let the Internet
community know about the changes in advance.
Matt
--
Matt Larson
VeriSign Naming and Directory Servic
Re:hmm, but is this really a good thing? (Score:5, Informative)
On top of that, maximum-frequency error responses are only a problem when you have enough headstrong or automated users to see requests for the SAME misspelled domain name just past the SOA MINIMUM (or TTL, if appropriate) time. It is not a problem for valid name requests, since they have separate TTLs. While that frequency of lame requests is indeed a valid assumption with infinite load, in practice, only the largest ISPs will see anything that approximates that traffic.
Your comment that domains are not supposed to change every minute is correct for some domains; but the particular domains in question (TLDs) do change every minute as new domains are registered or expire. (Other things, like DHCP-driven dynamic DNS, can also legitimately cause frequent zone updates.)
Re:dynamic dns (Score:5, Informative)
1: a.root-servers.net (refers request to tld2.ultradns.net)
2: tld2.ultradns.net (refers request to ns1.osdn.com)
3: ns1.osdn.com (returns 66.35.250.150)
Adding and deleting domains causes changes at #1 and #2. Changing the name servers assigned to a domain also happens at #1 and #2. Changes to an IP address (like the IP address for www.slashdot.org), which is what DynDNS and the like covers, would take place at #3.
One last note: If you have a domain already in place, and you want to change its nameservers over to DynDNS (possibly to take advantage of their dynamic update service), then #1 and #2 would get involved (since you're changing a nameserver). Under the system being phased out, that would have given you a day-long delay.
Re:increase of (mostly useless) traffic exptected? (Score:4, Informative)
Re:Emergency use (Score:5, Informative)
ostiguy
Re:Why? (Score:4, Informative)
This will affect DNS customers not consumers. DNS is a purchased service (not a product) Businesses are its customers, users are its' consumers. Verisign wants to make a positive impact on its' customers to turn more revenue.
Root servers? (Score:5, Informative)
Re:Fifteen minutes? (Score:3, Informative)
Re:hmm, but is this really a good thing? (Score:3, Informative)
# dig a alksasdasdqweqwehqwe.com
com. 10793 IN SOA a.gtld-servers.net.
nstld.verisign-grs.com.
109
1800 --- refresh
900 --- retry
604800 --- expiry
900 --- minimum aka "default" for this domain.. it's the time for NXDOMAIN responses too
Re:hmm, but is this really a good thing? (Score:5, Informative)
1. The "minimum time" set to 15 minutes means the servers will not check for an update on a record until it is at least 15 minutes old.
2. The 5 minute transfers. This is how often the root servers check with each other. This has nothing to do with any other server. Not the registars, not your ISP's DNS server; only the root servers.
3a. The serial change from yyyymmddnn to Unix epoch time makes perfect senese. And no, it does not suffer the 32-bit problem. Serial numbers can be much more than 32 bits. Heck the yyyymmddnn takes 8 bits per character now, so 80 bits just for that. Dare I guess how far into the future an 80-bit Unix time would go (if it was stored that way)?
3b. If this serial change screws up your DNS Cache server simply flush the cache, problem solved. If you have some application (as suggested in the memo) that relies on the serial you need to update your software, now.
4. Whoever suggested this as a backup plan for having only one server run your whole opperation: You are dumb. Now go away or I shall taunt you a second time.
5. The TTL for a standard DNS entry is not going to change. So if your ISP's DNS server caches an entry it will (probably) keep it the same amount of time as it did before. (I say probably because most DNS severs can update records before their TTL expires).
Would the people who do not know how DNS works please stop posting your misinformation and speculations. Thanky you!
Re:hmm, but is this really a good thing? (Score:5, Informative)
You're correct on all counts except this one.
From RFC1035:
The YYYYMMDDxx way can't be used past 2148, the UTC way can't be used past 2038. (neither way breaks it, because the serial number wraps to 0)
Re:Root Servers... (Score:5, Informative)
This has nothing to do with the root servers [root-servers.org]. The slashdot article is inaccurate.
Verisign are publishing delegations in the DNS from their registry for the COM and NET domains much more frequently than they were before. The TTL on records in the COM and NET zones is not changed.
The affected nameservers are a.gtld-servers.net through m.gtld-servers.net. These are not root servers. They are authority servers for the COM and NET zones.
Verisign also runs two root servers (a.root-servers.net and j.root-servers.net). There has been no announced change in the way A and J are being run.
Re:Fifteen minutes? (Score:3, Informative)
Re:2038 fun (Score:5, Informative)
Re:hmm, but is this really a good thing? (Score:3, Informative)
as a side note. for everyone that doesn't pay attention to dns and have been spouting random crap (eg, not you).
also, verisign pointed out the TTL will stay to 24 (or 48?) hours, so this really only affects NEW domains, unless you set your zone ttl to much lower in the first place (your zone has a higher trust than verisign's, so the ttl from that zone gets cached instead of theirs)
Re:dynamic dns (Score:3, Informative)