Verisign Speeds Up DNS Updates 131
Changeling writes "According to Matt Larson, a representative of VeriSign Naming and Directory Services, on September 8, 2004 Verisign will be switching from performing 2 updates per day of the .com and .net zones to performing updates every few seconds. According to Matt, 'After the rapid DNS update is implemented, the elapsed time from registrars' add or change operations to the visibility of those adds or changes in all 13 .com/.net authoritative name servers is expected to average less than five minutes." Full story can be found here."
I wonder what brought this on? (Score:2, Insightful)
Thanks, Verisign... (Score:5, Funny)
Re:Thanks, Verisign... (Score:2, Funny)
I second that.
Re:Thanks, Verisign... (Score:2)
Re:Thanks, Verisign... (Score:1)
Anyone who ever need to migrate a major website to a new IP will benefit from this change.
Re:Thanks, Verisign... (Score:2)
Re:Thanks, Verisign... (Score:4, Insightful)
You can lower the recommened caching timeouts on your own DNS server. So if your ISP changes the IP of your web server other's DNS servers will request the data from your's again sooner. But of course this can place a higher load on your DNS server.
Re:Thanks, Verisign... (Score:4, Informative)
Re:Thanks, Verisign... (Score:2)
And just in case you are looking for a good, cheap, and even free alternative, check out ZoneEdit [zoneedit.com]. Highly recommended.
it's not clear to me... (Score:5, Insightful)
The same seems to be true with making DNS changes (new IP address, etc). However, doesn't that mean they will have to adjust the TTL value of the domains all the way down to 5 minutes, which will raise the number of queries skyhigh compared to what they are at now? (Thanks to caching)
Re:it's not clear to me... (Score:5, Informative)
Re:it's not clear to me... (Score:5, Informative)
No. Just because the .com and .net TLDs have a lower TTL should have nothing to do with the TTL on subdomains of that. You'd continue to cache a second level domain per the definition of whatever the administrators set in their zones.
"A little-known DNS behavior called credibility" (Score:5, Informative)
> One thing I'd be interested to know, but can't find the answer to on
> VeriSign's FAQ page about this change[1], is whether the TTL value
> will still be 48 hours. If it is, that will mean that although new
> domains
Verisign Registry's Matt Larson answered this on the NANOG list late Friday:
One other issue: a few people have sent me private email asking if we're planning on changing the 48-hour TTL for NS records and A records in
In a nutshell, DNS data has different levels of credibility or trustworthiness depending on where it's learned from. That's relevant here because the version of a zone's NS records from the zone's authoritative servers is more trustworthy than the version obtained from the zone's parent name servers. For example, the foo.com NS records received from a foo.com authoritative server are believed over the foo.com NS records received from a
- - An iterative resolver chasing down, for example, A records for
www.foo.com queries a
records (with a 48-hour TTL) it receives.
- - The resolver then queries one of the foo.com name servers for the
www.foo.com A records.
- - In the response the resolver receives the www.foo.com A records,
along with foo.com's own version of the foo.com NS records--and this
is the important part--which have the TTL set by the foo.com zone
owner.
- - According to the credibility scale, the just-received foo.com NS
records are more credible than the cached foo.com NS records from
and all.
In other words, for all the iterative resolvers out there that have this credibility mechanism, the 48-hour TTL on data in
Re:"A little-known DNS behavior called credibility (Score:1)
Well, I don't remember Matt Larson being on me Friday, but I do remember being puzzled as to why I fouond a traffic cone in my bed.
Re:"A little-known DNS behavior called credibility (Score:1)
Re:"A little-known DNS behavior called credibility (Score:5, Funny)
Which became even less well-known after Verisign hijacked DNS with SiteFinder
</sarcasm>
- Neil Wehneman
Re:"A little-known DNS behavior called credibility (Score:3, Interesting)
So for all secure DNS resolvers, TTL will still be 48 hours until Verisign works out a way to let people update it themselves.
Re:"A little-known DNS behavior called credibility (Score:2)
Wow, it sounds like he's talking about a well-known DNS attribute called "AUTHORITY".
Domain Name Portablity... (Score:5, Insightful)
So... the main barrier for switching web hosting providers has just fallen away.
Re:Domain Name Portablity... (Score:1)
As I read it, this changes nothing, because updates will still take days to get to users.
Re:Domain Name Portablity... (Score:3, Insightful)
Re:Domain Name Portablity... (Score:1)
Re:Domain Name Portablity... (Score:5, Funny)
Re:Domain Name Portablity... (Score:1, Redundant)
As new domains can be brought on line instantly, they can switch source names in both the mail headers and embedded URLs and thereby more nimbly evade DNS based spam detection methods such as the newer methods (such as SURBL: http://www.surbl.org )in the upcoming Spamassassin 3.0.
There are others who are interested in quickly moving web sites from place to place, and most of them are up to no good, Such as warez, pirate, and terrorist sites etc.
Legit
Re:Domain Name Portablity... (Score:1, Insightful)
Dns. I don't think that word means what you think it means.
hint: look at the real reason why it sometimes takes days when you make a change, and you'll realize that it has nothing to do with verisign or root servers.
As a consumer (Score:2, Insightful)
Glad to see Verisign can do something right for a change.
Censorship? (Score:5, Interesting)
The bad part: if someone gets Verisign to shut off your DNS, your site goes dark before anyone knows what happened. It's a lot harder for anyone to mirror it when the news starts breaking.
Re:Censorship? (Score:2)
Re:Censorship? (Score:3, Informative)
Now watch as I get modded down for goatse :)
WHOIS (Score:1, Interesting)
All it takes is one or two people to file a claim with ICANN or your registrar that your whois info is wrong and many registrars such as GoDaddy and Dotster will pull the domain away no questions asked and then point to ICANN rules as a scapegoat.
I've heard of times where people got their domain yanked because the phone line was b
Re:Censorship? (Score:4, Interesting)
Censorship concerns usually go at the ISP to pull down the content altogheter, as afterall it most likely would still be available by IP address anyway.
It's in a trademark case that the owner of the trademark might seek to overtake a domain from somebody they don't like. In that case, the publisher can simply repost their content under another domain, or direct people to the IP address and forget about DNS.
If there's an injunction (Score:2)
I'm more concerned about a situation where your site gets shut down by surprise. You might have it hosted in some a country where ISP's aren't so quick to censor as they are in the US (you might even be a citizen of that country publishing stuff that's legal there), but the DNS system creates another point of attack.
Re:Censorship? (Score:2)
Re:Censorship? (Score:2)
Uh, wouldn't you not notice until the site is dark, whether it takes 24 hours or 2 minutes? It's not like websites perform a slow fadeout.
Re:Censorship? (Score:2)
More importantly, if someone makes a mistake in the configuration it takes far less time to debug if you only have 5 minutes to wait for the info to propagate.
The fact the info might have been cached is not relevant when you are testing a config, you just flush your cache out.
Re:Censorship? (Score:1)
Given it's web data (from the word "site"), browsers usually cache the ipaddress anyway.
Re: (Score:1)
Re:WTF (Score:2)
Then it goes nowhere, but does it really fast!
On-Demand Update? (Score:2, Insightful)
This might save unnecessary traffics, similar to a hub vs a switch?
Re:On-Demand Update? (Score:2)
Re:On-Demand Update? (Score:1)
Use $TTLs so it expires faster around the time you are making changes.
And if you want to point fingers at DNS for being hard to keep in sync, take a look at LNP
Spammer's Delight... (Score:5, Interesting)
Will rapid DNS updates impact SPAM?
Verisign anticipates negligible increases in SPAM as a result of more frequent updates to the
Translation: When a spamvertized site is unpluged by hosting company X, the spammers can quickly redirect their domain to point at their new server at hosting company Y...
In the cat and mouse game that is spamming, the mice have just gotten an ability to flee faster.
Re:Spammer's Delight... (Score:5, Informative)
Re:Spammer's Delight... (Score:1)
Glad to see Verisign coming up to the times (Score:5, Insightful)
Yep, your org took less than 5 mins (Score:5, Informative)
Re:Yep, your org took less than 5 mins (Score:4, Funny)
Re:Glad to see Verisign coming up to the times (Score:2)
I'm still getting hits on my old website 2 months after changing the DNS... there are some ISPs that are just plain broken - luckily the monotiry.
Re:Glad to see Verisign coming up to the times (Score:1)
Re:Glad to see Verisign coming up to the times (Score:2)
Err.. (Score:1)
Someone please explain.
Re:Err.. (Score:2, Insightful)
Now, however, you can leave, it will mean lower hosting prices for everyone. Not to mention, having a process be more efficient
Re:Err.. (Score:2)
Re:Err.. (Score:1)
In fact, this has absolutely no baring unless you are changing DNS servers
Which often happens when changing web hosting providers.
Yet another Y2038 problem (Score:1, Funny)
They should have made it what I made it when I had to program an automatically generated serial number: (Unix timestamp - some other number (414500033 to be exact)) / 60
This timestamp won't expire...for a while.
Re:Yet another Y2038 problem (Score:3, Interesting)
The solution is to have zone transfer clients transfer the zone regardless of whether the serial number has increased or decreased; this is why DJB's axfr (zone transfer) client does.
Overview for people who don't know DNS: The serial number is used in automated transfers of DNS information to determine whether the information has been updated. If the integer has been incr
Re:Yet another Y2038 problem (Score:2)
Re:Yet another Y2038 problem (Score:1)
For anyone that's interested, you can see the last update like this:
$ dig @A.GTLD-SERVERS.NET com soa
~
com. 172800 IN SOA a.gtld-servers.net. nstld.verisign-grs.com. 1089520605 1800 900 604800 900
so the last update was at 1089520605
Only affects root's maps (Score:5, Informative)
All that VeriSign is doing is making changes to domains (i.e, new domains, deleted domains, and changing DNS servers for a domain) become visible in the root maps sooner.
For example, if I wanted to move a DNS server for domain x.com, currently, I'd log into my registrar's on-line update program, change the DNS IP address, and wait up to 12 hours for the root map for .com to advertise the new IP address of my DNS server for domain x.com. With the changes, the .com root map will advertise the change within 5 minutes of me making the change. Any queries looking up my NS record after this will see the new IP address for my DNS server(s). Note, however, that DNS servers could have your NS info cached from a lookup that occured 10 minutes before you changed the info, so it could take those DNS servers a while to see the updated information in the root maps.
If I simply wanted to move a web server from IP address a.b.c.d to IP address w.x.y.z in the same domain, and I'm not moving the DNS server, VeriSign increasing the updating of root maps doesn't have anything to do with this.
For those who do make changes to domain information (i.e, IP addresses for DNS servers), or add new domains, this will be a definate plus.
Don't understand DNS (Score:2)
Re:Don't understand DNS (Score:1)
Re:Don't understand DNS (Score:3, Informative)
-- http://computer.howstuffworks.com/dns.htm
Much, much more in-depth reading
-- http://www.dns.net/dnsrd/rfc/ (all relevent RFC's)
FAQ of BIND (The most common DNS server)
-- http://www.nominum.com/getOpenSourceResource.php?
Re:Don't understand DNS (Score:1)
Verisign clearly didnt update their name servers more than twice a day - they didnt load new changes as and when - just did a bulk load instead.
Bind allows updates without downing the name server using nsupdate - perhaps they've figured out how to use it.
What happens in 2038?! (Score:3, Insightful)
"these serial numbers are now based on UTC time encoded as the number of seconds since the UNIX epoch (00:00:00 GMT, 1 January 1970)"
Uhh, call me stupid, but isnt this the kind of moronic thinking thats gonna nail us AGAIN in 2038 when 32bit epoch dates roll over?! Does anyone know if bind can handle 64bit numbers for serials? Or is this just another screwup waiting to be discovered in 2037 just before the internet stops working cause all the DNS servers cant handle > 32bit
Re:What happens in 2038?! (Score:2)
Re:What happens in 2038?! (Score:1)
I was under the impression that the standard for serial numbering was YYYYMMDDrr where rr is the current "revision" number. I see that used in Bind systems, though I see MS-DNS using incremental numbers from 1.
So, extend the serial numbering scheme to allow YYYYMMDDxx, where xx is an actual recognizable number, perhaps 32-bit singed or unsigned. Then that would allow that many revisions
Re:What happens in 2038?! (Score:1)
Even so, that does not answer my question.
Re:What happens in 2038?! (Score:1)
Re:What happens in 2038?! (Score:2)
No, it's not, from rfc1035.txt...
The Sky is Intact (Score:2)
Yes, today's RFC limits it to 31 bits. Yes, bind stores it as 32 bits.
So by 2038 we need a new RFC and a new bind. But if you don't update your config files for the next 24 years you'll be OK.
Assuming DNS is still around in 24 years.
Cool, .com dyn-dns (Score:1)
Re:Cool, .com dyn-dns (Score:2, Informative)
Re:Cool, .com dyn-dns (Score:2)
Verisign doesn't do ANYTHING benevolently (Score:3, Interesting)
There are some obvious, immediate benefits with issues like this. Systems can more quickly route around outages and DDOS attacks.
However, I'm highly suspect that Verisign came up with this idea without some self-interest at the heart of it.
Why do I have this feeling that, any non-Verisign registrar won't get their updates reflected in the root servers as quickly as Verisign's own customers?
Re:Verisign doesn't do ANYTHING benevolently (Score:2)
Re:Verisign doesn't do ANYTHING benevolently (Score:2)
Re:Verisign doesn't do ANYTHING benevolently (Score:2)
um (Score:2)
Customers to Gain from Enhanced Web Services and Increased Benefits
HERNDON, VA - January 6, 2003 - VeriSign, Inc. (Nasdaq:VRSN), the leading provider of digital trust services, announced today that it has re-launched the Network Solutions brand under its wholly owned subsidiary Network Solutions, Inc. to conduct its domain name, Web site and e-mail service business. Network Solutions will provide a full range of professional, customized Web services for business
Re:um (Score:2)
MOUNTAIN VIEW, CA. November 25, 2003 - VeriSign Inc., a leading provider of critical infrastructure services for Internet and telecommunications networks, today announced the completion of the sale of its Network Solutions domain name registrar business to Pivotal Private Equity. The customer-facing registrar business is the world's leading provider of domain name registration services, and an industry leader in value added services
Re:Verisign doesn't do ANYTHING benevolently (Score:2)
However, I'm highly suspect that Verisign came up with this idea without some self-interest at the heart of it.
Hmmm. Seems like having things reroute better around DDOS attacks *is* in their own self interest.
Also, other have mentioned that competitors already have this. So it's in Verisign's self interest to have it as well, so they don't lose customers (maybe even gain
With everything else as instant as it is... (Score:1, Insightful)
Re:Actually, IP Addresses COULD be portable... (Score:1, Insightful)
Re:Actually, IP Addresses COULD be portable... (Score:1)
Great.
Re:Die script kiddie (Score:5, Insightful)
I doubt it. If an ordinary web browser can find the site, then a zombie could too.
Re:Die script kiddie (Score:5, Funny)
We're under attack! Rotate DNS frequencies!
Re:Die script kiddie (Score:1, Funny)
Re:Die script kiddie (Score:2)
Re:Die script kiddie (Score:2)