Faster Updates for DNS Root Servers Arrive 150
Tee Emm writes "VeriSign's DNS Rapid Update notice period (as announced on NANOG mailing list) expires today. Beginning September 9, 2004 the SOA records of the .com and .net zones will be updated every 5 minutes instead of twice a day. The format of the serial number is also changing from the current YYYYMMDDNN to a new one that depicts the UTC time." We first mentioned this back in July, but it's finally launching now.
dynamic dns (Score:5, Interesting)
Re:dynamic dns (Score:5, Informative)
The catch of course is that you have to be running bind locally to make it work. Which is fine if you're a unix-head and know how to work dns, but for the average joe, it's far from simple. I have a perl script that checks my Linksys firewall's IP every half hour, and if it's changed, updates the dns file, then runs nsupdate.
Re:dynamic dns (Score:3, Interesting)
Re:dynamic dns (Score:5, Funny)
I don't think anyone actually knows how to work dns. It's one of those magic things that you hack for a couple hundred hours and it finally does what you want it to - like qmail.
Re:dynamic dns (Score:2)
"So, Mr. Smith, it says here that you know Sendmail?"
"Well, I'm not virgin to it. I'm comfortable with Sendmail, but anything that requires a 1200 page book is a topic nobody REALLY knows."
Re:dynamic dns (Score:2)
I use a similar process when interviewing. Our company hands prospects one of those "Rate yourself from 1 to 10 forms on these 20 topics" forms. Anyone who rates themselves a 10 on ANYTHING gets a mental 7, because clearly they don't even know what they don't know. Somebody with the brains to rate themselves a 9 is very likely an expert, though some quizzing is needed to make sure, though a cross check on the number of 8-10's can usually tell you; nobo
Re:dynamic dns (Score:2)
I do.
The root servers serve up the root zone, which is pointers to tld servers. I don't really think you want them doing dynamic dyn-dns. You were thinking of the com/net servers perhaps?
Oops (Score:2)
I still claim to understand DNS even though at times I simply cannot read.
Re:dynamic dns (Score:2)
Re:dynamic dns (Score:2)
The part that sucks is that last time I tried installing cygwin, it was incredibly difficult, this coming from someone that manages many FreeBSD text-only servers, and uses many different flavors of linux. Perhaps cygwin has improved?
Re:dynamic dns (Score:2)
Re:dynamic dns (Score:2)
Re:dynamic dns (Score:2)
Re:dynamic dns (Score:2)
I wouldn't be surprised if this is included in pretty much every router these days.
Re:dynamic dns (Score:2)
The best hint I can give from my experience is upgrade the firmware on your D-Link if an update is available. If you have the latest firmware then try resetting the device to factory settings and upgrade to the latest firmware again. I once had a successful firmware update to my D-LINK (at least no re
Re:dynamic dns (Score:2)
I didn't want to bother installing a client on my server(s) because a) I don't want to run any more services than are neccesary and b) the DrayTek seems to handle it perfectly. And DrayTek are most definitely aimed at businesses, not consumers.
Re:dynamic dns (Score:5, Informative)
1: a.root-servers.net (refers request to tld2.ultradns.net)
2: tld2.ultradns.net (refers request to ns1.osdn.com)
3: ns1.osdn.com (returns 66.35.250.150)
Adding and deleting domains causes changes at #1 and #2. Changing the name servers assigned to a domain also happens at #1 and #2. Changes to an IP address (like the IP address for www.slashdot.org), which is what DynDNS and the like covers, would take place at #3.
One last note: If you have a domain already in place, and you want to change its nameservers over to DynDNS (possibly to take advantage of their dynamic update service), then #1 and #2 would get involved (since you're changing a nameserver). Under the system being phased out, that would have given you a day-long delay.
Re:dynamic dns (Score:3, Insightful)
I sure wouldn't want to try that, though....
Re:dynamic dns (Score:3, Informative)
Re:dynamic dns (Score:2)
I really don't think you would want to put much on a DynDNS network. After all, everything related to SMTP is automatically /dev/nulled by just about everyone in the world.
And to think, since they've done that, spam and viral infections on the internet have pretty much continue at pace.
I'm a disgruntled DynDNS user who can't send any email from my servers, even though they are legit.
Re:dynamic dns (Score:3, Funny)
For all registrars, or just some? (Score:3, Interesting)
Re:For all registrars, or just some? (Score:3, Informative)
Anyone have further input?
Re:For all registrars, or just some? (Score:3, Interesting)
AFAIK the serial number has only ever been in the format of YYYYMMDDNN as a reccomendation. There is nothing in the spec preventing you from numbering versions from 1.
Changing to a UTC timestamp in seconds is no big issue, but for conformity, it's nice if everyone does the same thing, or at least knows what everyone else is doing, especially if you have some software trying to make sense of it all.
Re:For all registrars, or just some? (Score:2)
While it may suck b/c you might have to change some workflow stuff at your ISP, it shouldn't be too difficult to write a script that produces a readable log of DNS changes.
Re:For all registrars, or just some? (Score:2)
Re:For all registrars, or just some? (Score:1)
hmm, but is this really a good thing? (Score:5, Insightful)
Re:hmm, but is this really a good thing? (Score:3, Insightful)
I don't see the point myself, domains are not supposed to change every minute anyway.
Re:hmm, but is this really a good thing? (Score:5, Informative)
On the day before you move, your TTL can be dropped to this 5 minutes so your address can be changes with minimal disruption. After the move, once your stable, your TTL can be increased once again, and network congestion is minimalised.
Of course, I could be talking out of my arse, one of you lot will put me right if this is the case.
Re:hmm, but is this really a good thing? (Score:5, Informative)
On top of that, maximum-frequency error responses are only a problem when you have enough headstrong or automated users to see requests for the SAME misspelled domain name just past the SOA MINIMUM (or TTL, if appropriate) time. It is not a problem for valid name requests, since they have separate TTLs. While that frequency of lame requests is indeed a valid assumption with infinite load, in practice, only the largest ISPs will see anything that approximates that traffic.
Your comment that domains are not supposed to change every minute is correct for some domains; but the particular domains in question (TLDs) do change every minute as new domains are registered or expire. (Other things, like DHCP-driven dynamic DNS, can also legitimately cause frequent zone updates.)
Re:hmm, but is this really a good thing? (Score:2)
Re:hmm, but is this really a good thing? (Score:5, Insightful)
Oh wait, VeriSign? We're all doomed.
Re:hmm, but is this really a good thing? (Score:1, Redundant)
Re:hmm, but is this really a good thing? (Score:4, Insightful)
The key thing comes down to if we can trust VeriSign to be doing their homework correctly. VeriSign's a very funny company to think about because their entire product line is based on encryption and ID services that define VeriSign as a root of trust... if you don't trust VeriSign to be an honest actor, practically everything they do becomes worthless.
It's so hard to get trust-based systems to work these days...
Re:hmm, but is this really a good thing? (Score:2, Insightful)
Re:hmm, but is this really a good thing? (Score:3, Informative)
as a side note. for everyone that doesn't pay attention to dns and have been spouting random crap (eg, not you).
also, verisign pointed out the TTL will stay to 24 (or 48?) hours, so this really only affects NEW domains, unless you set your zone ttl to much lower in the first place (your zone has a higher trust than verisign's, so the ttl from t
Re:hmm, but is this really a good thing? (Score:5, Informative)
Re:hmm, but is this really a good thing? (Score:1)
target ttl IN SOA domain "responsible person" serial refresh retry expire "nxdomain cache time"
Re:hmm, but is this really a good thing? (Score:3, Informative)
# dig a alksasdasdqweqwehqwe.com
com. 10793 IN SOA a.gtld-servers.net.
nstld.verisign-grs.com.
109
1800 --- refresh
900 --- retry
604800 --- expiry
900 --- minimum aka "default" for this domain.. it's the time for NXDOMAIN responses too
Re:hmm, but is this really a good thing? (Score:2)
Re:hmm, but is this really a good thing? (Score:2)
Maybe the guys at bittorrent should start a rogue P2P DNS serving system. If it worked well enough, it would become a defacto standard.
Re:hmm, but is this really a good thing? (Score:5, Informative)
1. The "minimum time" set to 15 minutes means the servers will not check for an update on a record until it is at least 15 minutes old.
2. The 5 minute transfers. This is how often the root servers check with each other. This has nothing to do with any other server. Not the registars, not your ISP's DNS server; only the root servers.
3a. The serial change from yyyymmddnn to Unix epoch time makes perfect senese. And no, it does not suffer the 32-bit problem. Serial numbers can be much more than 32 bits. Heck the yyyymmddnn takes 8 bits per character now, so 80 bits just for that. Dare I guess how far into the future an 80-bit Unix time would go (if it was stored that way)?
3b. If this serial change screws up your DNS Cache server simply flush the cache, problem solved. If you have some application (as suggested in the memo) that relies on the serial you need to update your software, now.
4. Whoever suggested this as a backup plan for having only one server run your whole opperation: You are dumb. Now go away or I shall taunt you a second time.
5. The TTL for a standard DNS entry is not going to change. So if your ISP's DNS server caches an entry it will (probably) keep it the same amount of time as it did before. (I say probably because most DNS severs can update records before their TTL expires).
Would the people who do not know how DNS works please stop posting your misinformation and speculations. Thanky you!
Re:hmm, but is this really a good thing? (Score:5, Informative)
You're correct on all counts except this one.
From RFC1035:
The YYYYMMDDxx way can't be used past 2148, the UTC way can't be used past 2038. (neither way breaks it, because the serial number wraps to 0)
Re:hmm, but is this really a good thing? (Score:2)
Doesn't Unix time wrap around some time in 2035? I think the kernel stores time since the Epoch at least in milliseconds, if not nanoseconds...
Re:hmm, but is this really a good thing? (Score:2)
Fantastic. (Score:4, Funny)
Technology adapts to changing circumstances and trends, old folks do not.
Why? (Score:1, Insightful)
Re:Why? (Score:4, Informative)
This will affect DNS customers not consumers. DNS is a purchased service (not a product) Businesses are its customers, users are its' consumers. Verisign wants to make a positive impact on its' customers to turn more revenue.
Re:Why? (Score:2)
For the average
In other news (Score:4, Funny)
Says CowBoy Neil, "Well, we figured at the increased rate, we could dupe stories at twice the usual rate. And also... uh... we could use my name in twice as many polls."
Reached for comment in his mother`s basement, Commander Taco said only, "DNS, smenesh, I think we all want to see GNNA update their trolls!"
Root Servers... (Score:5, Interesting)
So I don't exactly get it, but is this just the root servers that are going to be updating every five minutes? I read the links, but it still doesn't seem clear to me. I mean, if my registrar (or dns service or whatever) still only send in their updates once every day, this won't really help me as much right?
Of course, once they do send it in I will still get it updated an average of 6 hours faster I guess. Just curious, since the details were a little vague to us non-dns folks.
Re:Root Servers... (Score:2)
Re:Root Servers... (Score:5, Informative)
This has nothing to do with the root servers [root-servers.org]. The slashdot article is inaccurate.
Verisign are publishing delegations in the DNS from their registry for the COM and NET domains much more frequently than they were before. The TTL on records in the COM and NET zones is not changed.
The affected nameservers are a.gtld-servers.net through m.gtld-servers.net. These are not root servers. They are authority servers for the COM and NET zones.
Verisign also runs two root servers (a.root-servers.net and j.root-servers.net). There has been no announced change in the way A and J are being run.
Speed up attacks? (Score:3, Interesting)
Re:Speed up attacks? (Score:2)
Emergency use (Score:1, Insightful)
This is great use for emergencies. You can have a backup web server configured identically to the main one. If the first web server goes down, just update the IP address in the domain record and your back on-line in five minutes.
Good for those of us which host web sites for clients.
Re:Emergency use (Score:2, Informative)
this just helps if you want to switch nameservers within 5 mins
on top of that if you have a standby box bring it online with the old ip
Re:Emergency use (Score:5, Informative)
Re:Emergency use (Score:2)
Not only that, but you can have them with completely different hosts, even in different countries.
I've seen big businesses who have lost their web sites for days because of the hurricane...
Re:Emergency use (Score:3, Informative)
Happened to me with my vanity domain when afraid.org was cut off for about 8 hours due to abuse issues. His upstream provider cut him off due to spammers hosting DNS there and he had to take
Re:Emergency use (Score:5, Informative)
The record in a DNS root server never is meant to identify your web server, it's meant to indentify your primary and secondary DNS server, and it's those servers that work for you (or at least the ISP you work with) to identify your web server.
So, if you want fallover if your main web server goes down, you just need to update your local DNS record, not the one at the root servers. It's when your DNS servers explode that the five-minute updates would be helpful.
Re:Emergency use (Score:2)
Yep, my bad. I hope someone with a clue mods me down again!
Re:Emergency use (Score:5, Informative)
ostiguy
Re:Emergency use (Score:2)
Re:"Emergency" use (Score:2)
Cool.... (Score:5, Insightful)
This has no effect (Score:5, Insightful)
Re:This has no effect (Score:2)
No, but it certainly allows them to now rotate nameservers for their domains quickly. Imagine where they've got a number of nameservers for their domains setup, and in order to make it more difficult to determine where the nameservers are hosted, they bou
Misuse? (Score:1)
Re:Misuse? (Score:2)
In case of slashdot effect... (Score:5, Informative)
* From: Matt Larson
* Date: Wed Jan 07 17:49:43 2004
VeriSign Naming and Directory Services will change the serial number
format and "minimum" value in the
or shortly after 9 February 2004.
The current serial number format is YYYYMMDDNN. (The zones are
generated twice per day, so NN is usually either 00 or 01.) The new
format will be the UTC time at the moment of zone generation encoded
as the number of seconds since the UNIX epoch. (00:00:00 GMT, 1
January 1970.) For example, a zone published on 9 February 2004 might
have serial number "1076370400". The
be generated twice per day, but this serial number format change is in
preparation for potentially more frequent updates to these zones.
This Perl invocation converts a new-format serial number into a
meaningful date:
$ perl -e 'print scalar localtime 1076370400'
At the same time, we will also change the "minimum" value in the
and
to 900 seconds (15 minutes). This change brings this value in line
with the widely implemented negative caching semantics defined in
Section 4 of RFC 2308.
There should be no end-user impact resulting from these changes
(though it's conceivable that some people have processes that rely on
the semantics of the
zones are widely used and closely watched, we want to let the Internet
community know about the changes in advance.
Matt
--
Matt Larson
VeriSign Naming and Directory Servic
Fifteen minutes? (Score:5, Insightful)
Doesn't that mean they're updating every fifteen minutes, not every five?
Re:Fifteen minutes? (Score:3, Informative)
Re:Fifteen minutes? (Score:3, Insightful)
It means that dns servers which act like bind4 and bind8 will set the default Time To Live (TTL) for resource records without explicit TTL to 15 minutes. Servers which behave like bind9 will use this as the negative caching value for the domain, meaning that if it requests an ip from a domain which doesn't exist it will cache the result for 15 minutes. In effect this should mean that the actual root dns servers will be updated every 5 minutes, but someone looking for the domain (by normal means as oppos
Re:Fifteen minutes? (Score:3, Informative)
International Date Format (Score:5, Interesting)
Re:International Date Format -- typo (Score:2)
Re:International Date Format (Score:2)
Re:International Date Format (Score:2)
The switch goes away from a format that is rougly ISO 6801, minus the punctionation, to UTC. Interestingly, the new format will wrap earlier now. (In 2038, instead of 2148.)
This is UNIX format, NOT International Date Format (Score:2)
Yikes (Score:2)
Root servers? (Score:5, Informative)
2038 fun (Score:3, Insightful)
Brilliant move...:-(
What was wrong with sticking extra hour/minutes digits in the serial number - no y2k style problems at all....?!?
ie YYYYMMDDHHmmNN ??
Re:2038 fun (Score:1)
it doesn't really matter anyway, since zone serial numbers are allowed to wrap. secondaries understand how to handle this event as well, so there's no need for admins to step in and do anything in such cases, either.
Re:2038 fun (Score:3, Interesting)
Re:2038 fun (Score:2)
So, there still isn't an epoch problem, but for a different reason.
Re:2038 fun (Score:2)
just means one more risk/piece we have to check for when the epoch time rolls over the 32nd bit...
Re:2038 fun (Score:5, Informative)
Re:2038 fun (Score:2)
4294967295 (max unsigned 32-bit number)
20040909090201 (sample of YYYYMMDDHHmmNN)
Re:2038 fun (Score:2)
My point is that the 2038 issue now has the *potential* to effect DNS more than it did before..
Of course in the next 34 years we'll be using 128 bit (or larger) numbers anyhow
Re:2038 fun (Score:2)
Besides, we all know what a big deal Y2K turned out to be after all. Y2.038K will be an even smaller problem, since a) there is no user-interface for entering those numbers and b) except on the integer-size level, they are perfectly backwards compatable, ie sending you a string "1058382094" is a valid time, 32-bit or 64-bit or 4096-bit.
And the integer size issue needs to be dealt
Hell Yeah! (Score:4, Interesting)
Can't wait to go......switch some IP addresses....
Wow, netsol moves into the 80's (Score:2)
Re:Wow, netsol moves into the 80's (Score:2)
Things that are Certain (Score:2, Funny)
Sooner? (Score:2)
Good service. Awful UI. (Score:2)
---
I still use Verisign for my domains. It was inertia; I had my domains there, so I continued adding domains there.
I almost switched
How Long to Setup a Website? (Score:2)
Re:increase of (mostly useless) traffic exptected? (Score:4, Informative)