[CoursDNS/TP-ServeurDNS/TP_eng.html] juin 2006 pascal Hennequin

DNS LAB

Search first in Documents and Links, before asking any questions to the "local DNS guru".

Part 1: Exploring the Domain Name System with DIG tool

Objectives:

Hints:

Some questions to motivate your imagination:

  1. Who are the DNS root?
  2. How many solutions (choice between DNS servers) in iterative resolution of IP (v4/v6) addresses for host alambix.ipv6.int-evry.fr.? Is it different for resolution by a general host or by an INT host?
  3. What about correctness of delegation for following zones : xorg.org., fleximage.fr., u-bordeaux2.fr., enst.fr., transilien.com., every1.net., ibank.co.uk., 115.108.192.in-addr.arpa., 231.80.in-addr.arpa.
  4. Try to construct DNS tree under int-evry.fr. (domains? , zones?). Same with enst-bretagne.fr. tree. Same if someone speak about dedale.ipv6.rennes.enst-bretagne.fr..
  5. How many entries in zone int-evry.fr.? which Record Types? ..
  6. Find IP address of a distant host using only dig +norecurse requests. Link with dig +trace option?
  7. Where goes a mail with address xxx@int-evry.fr ? Same question with xxx@foobar.int-evry.fr, xxx@mailfax.int-evry.fr, xxx@hugo.int-evry.fr ? In last case, Is there any change if sender host use a line nameserver 157.159.100.81 in file /etc/resolv.conf?
  8. What is the motivation for "dig +nssearch" option?
  9. http://www.squish.net/dnscheck?
  10. ...

"Bonus" IPv6

  1. Is IPv6 active on your host?
  2. What is the difference between the following requests: dig @ipv6-1.int-evry.fr. ..., dig @ipv6-1.ipv6.int-evry.fr. ... and dig @zeratul.ipv6.int-evry.fr. ...? It depends on previous question, why?

"Super Bonus" Demo

Zone for testing RR types and wildcard (source file in docs): dig @ipv6-1.int-evry.fr zone.test. AXFR

"Extra Bonus" DNSSEC

How to "dump" a DNSSEC signed zone (and sub tree) without AXFR? try with zone enst.idsa.prd.fr., or ipv6.rennes.enst-bretagne.fr. or int-evry.caddisc.enst.idsa.prd.fr.

Part 2: Setting up a DNS Server

Objective:

The work consists here in installing a DNS server using ISC BIND software. To verify the good behaviour of various DNS services, useful tests must be defined and applied on this DNS server.
Successive steps could be:
  1. a Forward-Only server: caching, none authoritative zone, no iterative resolution, accepting recursive requests relaying them to another recursive DNS server.
  2. a Cache-Only server: caching, none authoritative zone, accepting recursive requests using iterative resolution.
  3. a Master Authoritative server: caching, master server for a local zone XXX.test., iterative resolution. Create a zone data base with some RR choosing names as you want but using operational informations (IP address,...).
  4. Variations:
    1. Modify to an Authoritative-Only server : no iterative resolution, no forwarding, only iterative response. (cache ?)
    2. Create sub-domains AAA.XXX.test. and a sub-zone BBB.XXX.test. in the same server.
    3. Find an administrator for a zone YYY.test. and suggest him to become a Slave Authoritative server for the zone. As he reads the same text, he will offer you to become a slave server for your zone XXX.test. . Test here the behaviour of DNS zone update (notify, SOA TTLs, modification of serial number..)
    4. Become a Stealth Slave Authoritative server for zone int-evry.fr. (and/or ipv6.int-evry.fr., 159.157.in-addr.arpa., ...)
  5. Find the administrator for the domain ipv6.int-evry.fr. and obtain a delegation XXX.ipv6.int-evry.fr. to attach your zone in the "worldwide" DNS.

Operational hints:

Part 3: DNSSEC transition

Objectif :

Signing a DNS zone with respect to DNSSEC (RFC4033, 4034, 4035) and publishing the signed zone with a master authoritative server.

Hints :

Part 3 bis: Securing DNS server transactions

Secured configuration of zone transfer and/or dynamic update using transaction signing with TSIG mechanism. (NB: BIND 9.3.1 only partially supports SIG(0) mechanism)

.. To be done ... self-formation !