Introducing DNS


If you have ever connected to a Web site by name, you have used DNS. DNS is a service that is used on the Internet for resolving fully qualified domain names (FQDNs) to their actual Internet Protocol (IP) addresses. For example, suppose you were preparing to take the latest Windows Server 2003 certification exam. You've asked your co-workers about the best study guide available, and they recommend that you check out Que Publishing's Web site to see what is available. Your obvious question is, "Where can I find Que Publishing's Web site?" Before DNS, the answer would have been 63.240.93.132, and if you are like most people, you might have remembered that IP address for about 30 seconds. Given the likelihood of you forgetting that IP address, you never would have been able to use it to find Que Publishing's site (or get that study guide you were looking for).

DNS puts a user-friendly face on that obscure numeric address. With DNS, your friend can tell you to go to www.quepublishing.com, and the DNS infrastructure of the Internet translates the name to the correct address, 63.240.93.132. It's like a big phone book. You put in a name, and DNS gives you the correct number. Fortunately for those of us with a limited ability to memorize strings of numbers, the Internet community recognized the benefits of a name resolution system as a critical part of the infrastructure that would make up the original Internet architecture. And DNS was born.

Note: Domain Name System or Domain Name Service

You may have heard that DNS stands for "Domain Name Service," yet it is referred to as "Domain Name System" in the previous sections of this chapter. These names are interchangeable, although Microsoft tends to use "Service," whereas most Internet users use "System." From here on in the chapter, we use the term "System" for consistency.


DNS is a hierarchical database that contains names and addresses for IP networks and hosts, and it is used almost universally to provide name resolution. This is true now more than before because Microsoft has embraced DNS as its name resolution method for Windows Server 2003 (and Windows 2000 Server before it), in place of the more proprietary, less accepted Windows Internet Name System (WINS). Before we tackle DNS in a Windows Server 2003 network, we should cover a little of the history and makeup of DNS in general, how DNS zones work, and what the DNS server roles are.

The History of DNS

Back in the early days of the Internet, when it was known as the Advanced Research Products Agency Network (ARPAnet) and the number of hosts on the network was less than 100, there used to be a master list of names and IP addresses called the HOSTS file. It was maintained by the Stanford Research Institute's Network Information Center (known as the SRI-NIC at the time), and it worked very well, as long as the number of hosts was low and changes were infrequent. Everyone using the network would periodically download a copy of the HOSTS file, and they would have a local table of names and addresses with which to connect to computers by name. Windows Server 2003 (and most TCP/IP stacks in general) still has this functionality, although it is seldom used in conjunction with the Internet any longer. This method of name resolution was great for a while, but as the number of computers grew, this solution ran into a few problems, including the following:

  • Traffic As more and more people tried to access the HOSTS file, the load on the SRI-NIC network and servers became excessive.

  • Consistency As the number of hosts and the number of changes grew larger and larger, propagation of the HOSTS file became nearly impossible. As the file was being propagated to the most distant servers, new servers were being added to the network, rendering obsolete the file that had just been distributed.

  • Flat-file limitations Windows NT 4.0 domain administrators are familiar with flat-file limitations. Because the HOSTS file was a flat file (similar to the way domain objects are stored under Windows NT 4.0 domains), a requirement existed that every name be unique. No hierarchical capabilities were built into the naming structure. As a result, coming up with unique names that were also intuitive became more and more difficult.

Exam Alert: Comparing DNS with HOSTS Files

For Exam 70-291, you need to be familiar with the advantages of DNS over the flat-file method of name resolution provided by a HOSTS file.


The network needed a better answer than a text file for name resolution. In 1983, in RFCs 882 and 883, Paul Mockapetris introduced DNS. These RFCs have since been superseded by RFCs 1034 and 1035, the current DNS specifications. You should also be aware of RFC 2136, which defines the standards for DDNS on which Windows Server 2003 relies.

Note: A Note on RFCs

Request for Comments (RFC) documents are used to create proposals regarding the Internet and Internet technologies. If an RFC can garner enough interest, it may eventually become a standard. You can review all the existing RFCs by going to www.rfc-editor.org. We reference RFCs for standards-based protocols wherever possible throughout the book.


The DNS Database

DNS is a distributed database that allows local control of DNS for segments of the namespace while still maintaining a logical architecture to provide the local information throughout the network. Each piece of the DNS database resides on a server known as a name server. The architecture of DNS is designed so that there can be multiple name servers for redundancy, and caching of names to the local server is also supported, further enhancing DNS's robustness. In addition, with parts of the overall namespace placed on separate computers, the data storage and query loads are distributed to thousands of DNS servers throughout the Internet. The hierarchy of DNS is designed in such a way that every computer on or off the Internet can be named as part of the DNS namespace.

To effectively install, configure, and support the Windows Server 2003 DNS server service, you must understand the underlying architecture of today's DNS. Rather than having you read the RFCs (although you are encouraged to do so to improve your understanding of DNS), the following sections discuss the DNS namespace architecture and how individual DNS servers support their portions of the overall namespace as well as the specifics of the Windows Server 2003 DNS server service.

DNS Domains Defined

As mentioned earlier in this chapter, you probably have already used DNS, regardless of whether you were familiar with the underlying mechanism. Domain names such as www.microsoft.com or www.quepublishing.com are easy to comprehend. All you need is the ability to read. However, this simplicity comes at a price: The DNS namespace is complex. DNS names are created as part of a hierarchical database that functions much like the directories in a file system. Hierarchies are powerful database structures because they can store tremendous amounts of data while making it easy to search for specific bits of information. Before we examine the specifics of the DNS namespace hierarchy, let's discuss hierarchies in general.

Note: A Simple Example of a Hierarchy

Microsoft's Active Directory is an excellent example of a hierarchical database. Of course, given that the Active Directory hierarchy is created on top of the existing rules for a DNS namespace, the information on the DNS hierarchy directly relates to the construction of Active Directory.


Hierarchies

You need to understand the following terms related to hierarchies:

  • Tree A tree is a type of data structure in which each element is attached to one or more elements directly beneath it. In the case of DNS, this structure is often called an inverted tree because it is generally drawn with the roots at the top of the tree.

  • Top-level domain (TLD) A TLD is related to the suffix attached to an Internet domain name. There are a limited number of predefined suffixes, and each one represents a TLD. The most common TLDs (at least in the United States) are com, edu, gov, mil, net, and org.

  • Node A node is a point where two or more lines in a tree intersect. In the case of DNS, a node can represent a TLD, a subdomain, or an actual network node (that is, a host).

  • FQDN An FQDN is a domain name that includes all domains between the host and the root of DNS. For example, www.microsoft.com is an FQDN.

  • Leaf A leaf is an item at the very bottom of a hierarchical tree structure that does not contain any other objects. In DNS, leaves are called nodes. In the earlier example, www would be the leaf of FQDN www.microsoft.com.

  • Second-level domain (SLD) This is the domain that includes the TLD and the next organizational unit of the FQDN. quepublishing.com is an example of an SLD.

  • Zone A DNS zone is a logical grouping of hostnames within DNS. For example, quepublishing.com is considered the forward lookup zone for Que Publishing. It is where the information about the Que Publishing host is contained within DNS.

If you told typical end users that they have been working with a hierarchy since the first time they turned on a computer, many would have no idea what you were talking about. In fact, a fair number of administrators would have to think about it as well. However, it's true: MS-DOS version 2 introduced a hierarchy to PCs in the form of the file system, and systems such as mainframes and Unix used hierarchical file structures much earlier than did MS-DOS. Why do computers need a hierarchical file system? Because storing files as an endless alphabetic listing is inefficient; the files can be stored much more efficiently in related groups. Today all computers use hierarchical structures for organizing file storage.

In DNS, the containers are called domains. The hierarchy starts with a root container, called the root domain. The root domain doesn't have a name, so it is typically represented by a single period. Directly below the root domain are the top-level domains (TLD), which are also sometimes called first-level domains. Lower-level domains are second-level, third-level, and so on (see Figure 3.1). Every domain name has a suffix that indicates the TLD to which it belongs. There are only a limited number of such domains.

Figure 3.1. This portion of the DNS hierarchy shows the location of www.quepublishing.com in the DNS database in relationship to other parts of the DNS database.


The following are some examples of TLDs:

  • com Originally, the com domain was supposed to contain only commercial entities, but com has become the overwhelming favorite TLD, and everyone wants his or her personal subdomains to be in com. Because com has been overused and abused, it's nearly impossible to come up with a sensible new name for a com subdomain. The crowding within com is the main impetus behind the definition of new TLDs. An example of a com domain is quepublishing.com.

  • org The org domain is supposed to accommodate organizations that are noncommercial in nature. org is a good place for nonprofit organizations, professional groups, churches, and other such organizations. An example of an org domain is stjude.org.

  • edu The edu domain was originally supposed to embrace all types of educational institutions, but it began to fill up quickly as schools gained access to the Internet. Now it is primarily reserved for higher education institutions. Primary and secondary schools are supposed to register in their state domains, which are subdomains of their country domains. An example of the edu domain is berkeley.edu.

  • gov The gov domain contains agencies of the U.S. federal government. It does not include the military, however, which uses the mil domain. An example of the gov domain is whitehouse.gov.

  • net The net domain supports Internet service providers (ISPs) and Internet administrative computers. An example of the net domain is qwest.net.

  • Country domains Each country is assigned a unique TLD. Some examples include the following:

    • au Australia

    • ca Canada

    • uk United Kingdom

    • us United States

  • New domains A number of additional domains have been created, including biz, coop, info, museum, name, and pro. These have been added for a variety of purposes, and the list continues to grow as the need for new domains expands. By the time this book makes its way into your hands, there will probably be even more TLDs available.

Originally managed by the Internet International Ad Hoc Committee (IAHC), creation and management of TLDs is now done based on the guidelines detailed in the Generic Top Level Domain Memorandum of Understanding (www.gtld-mou.org). This memorandum divides management of the TLDs between the U.S. Department of Commerce's National Telecommunication and Information Administration (NTIA; www.ntia.doc.gov) and Internet Corporation for Assigned Names and Numbers (ICANN; www.icann.org). The ICANN site related to TLDs is www.icann.org/tlds. Management of TLDs varies from name to name; the ICANN site details the organizations responsible for managing each TLD.

Unfortunately, due to slow adoption by the general public, the creation of these additional domains has not completely alleviated the crowding of the original com and net domains. People still consider the com namespace to be the only acceptable namespace, and until the new TLDs become more widely accepted, you can expect to work with one of the original TLDs in most situations.

As discussed previously, DNS is used to translate a hostname to an IP address. The DNS name typically looks something like this:

isaac.publishing.quepublishing.com


This DNS name is known as the host's FQDN because it lists the host's precise location in the DNS hierarchy. The DNS name in the example represents the host isaac in the subdomain publishing (this is frequently a department or division in a company), which is in the domain quepublishing (this is frequently the name of the company or organization that has registered the domain), which is in the TLD com. For the name to be complete, you also need a trailing dot, which indicates the root of the namespace.

When an organization wants to establish a domain name on the Internet, it must register the domain name with one of the authorized registration authorities. One such organization with which many people are familiar is VeriSign, Inc., which purchased Network Solutions, which was formerly the InterNIC. (You will still find references to the InterNIC in DNS-related documentation, so you need to realize that it is now a defunct TLD registrar.)

You can research new domain names and access registration forms at www.networksolutions.com. You can also contact your ISP for assistance; most ISPs offer domain name registration as part of their service. To register a domain, you need at least two name servers to provide resolution information for your domain. Some of the registrars will host your domain on their DNS servers for an additional fee, and most ISPs will also host your zone for you on their DNS servers. That's great, but what exactly is a DNS zone? Read on to find out.

Exam Alert: Understanding FQDNs

For the exam, make sure you have a good understanding of what an FQDN is and how it is represented.


DNS Zones

It is very easy to get lost in the maze of acronyms and buzz words surrounding DNS, especially if you are having a conversation with someone who has been working with IP networking and DNS for a while. You have primary masters for each zone, which is also a domain, unless it's a reverse lookup zone, and then you have zone transfers happening when you least expect it. To the uninitiated, this can sound alarmingly like some arcane networking ritual in which you pay homage to the DNS deities. However, it's not nearly as bad as it sounds.

Before we get any deeper into the Windows Server 2003 DNS infrastructure, we need to discuss what exactly is meant by DNS zone. First, although typically abbreviated in the world of DNS, a zone is actually a zone of authority, which means it contains the complete information on some part of a domain namespace. In other words, it is a subset of a domain. The name server is considered to have authority for that zone, and it can respond to any requests for name resolution from that zone. So when you look at the DNS name www.quepublishing.com, you know that quepublishing.com is a DNS zone within the com hierarchy. www denotes the DNS record of a host contained within the quepublishing.com zone. This conceptual representation of a zone also has a physical counterpart: All the information related to a particular zone is stored in a physical file known as the zone database file or, more commonly, the zone file. If the DNS zone is not stored in Active Directory, under Windows Server 2003, this file will be found in the directory %systemroot%\system32\dns.

Note: The Difference Between a Zone and a Domain

Although the terms "zone" and "domain" can seem as if they are used interchangeably, there is a difference. A DNS domain is a segment of the DNS namespace. A zone, on the other hand, can contain multiple, contiguous domains. For example, quepublishing.com is a DNS domain. It contains all the information for that specific portion of the DNS namespace. sales.quepublishing.com is another example of a domain, and it is contiguous with the quepublishing.com domainin other words, the two domains "touch." So if you were to create a DNS forward lookup zone on a DNS server, it could contain records for both domains. Zones allow for the logical grouping and management of domains and resource records on DNS servers.


Note: Active Directory and DNS

We examine the integration and operation of DNS and Active Directory later in this chapter in the section "Integrating Active Directory and DNS."


The Windows Server 2003 DNS service supports three basic types of zones:

  • Forward lookup zones

  • Reverse lookup zones

  • Stub zones

The following sections take a closer look at these zone types, which make up the underlying structure of DNS.

Forward Lookup Zones

Forward lookup zones provide the hostname-to-IP address resolution for which DNS is most frequently used. A forward lookup zone contains resource records that contain the information about the resources that are available within that zone. Windows Server 2003 relies on the SRV (service) resource record to provide IP address information about servers and services within a zone, so that workstations can locate needed services such as Lightweight Directory Access Protocol (LDAP). The SRV record is also used to provide a single service over multiple hosts, assign priorities to hosts for a particular service, and move services from host to host easily. More information on the SRV record can be found in RFC 2782, "A DNS RR for specifying the location of services (DNS SRV)."

Reverse Lookup Zones

A reverse lookup zone (as you may have guessed from the name) provides the opposite resolution from a forward lookup zone: It resolves IP addresses to hostnames. This is discussed in greater detail later in this chapter, in the section "Reverse Lookups."

Stub Zones

Microsoft introduced support for stub zones for the first time in Windows Server 2003. A stub zone contains only those resource records that are necessary to identify the authoritative DNS servers for that zone. Such resource records include Name Server (NS), Start of Authority (SOA), and possibly glue host (A) records. (Glue host records provide A record pointers to ensure that the master zone has the correct name server information for the stub zone.) Stub zones are frequently used for the following:

  • To keep delegated zone information up-to-date Because a stub zone is used to provide pointers to a delegated zone, updating the stub zone causes the DNS server hosting both the parent zone and the stub zone to maintain a current list of authoritative DNS servers for the delegated zone.

  • To improve name resolution performance Because a stub zone enables a DNS server to perform recursive resolution by using the stub zone's list of name servers, the DNS server making the request does not need to query any Internet name servers or internal name servers to get the resolution.

As an example of when you might want to use stub zones, consider the scenario where two organizations are closely linked and often need to access resources on each other's networks. If you are the systems administrator in organization A, and you created a stub zone that uses one or more name servers within organization B, your users would simply issue a DNS query to an organization A DNS server, which then forwards the query to one of organization B's name servers to resolve. This solution provides a simpler and more efficient means of helping your users resolve those host names without the burden of maintaining another secondary zone on your DNS servers.

Zone Delegation

With zone delegation, one DNS server can assign the administration of a domain to another DNS server. For example, let's look at the quepublishing.com domain. Let's say that the IT Department is responsible for the quepublishing.com zone, which contains the domains quepublishing.com, sales.quepublishing.com, and developers.quepublishing.com. The IT Department maintains the DNS records for all three zones, but the developers who are working on software projects are always adding and removing hosts to and from their domain and want to be able to update their resource records without having to place a request with the IT Department each time. To take care of this, the IT Department can delegate the administration of the developers.quepublishing.com zone to a DNS server that is maintained by the developers. The main zone, quepublishing.com (zones are typically named for the "uppermost" domain in the DNS hierarchy), would maintain a delegation entry that points queries about the developers.quepublishing.com domain to the developers' DNS server.

Exam Alert: Zone Delegation

Be sure you understand what zone delegation entails. In a distributed environment with local administration, delegation can be critical to a successful DNS implementation.


Zone Transfers

A zone transfer involves the copying of the zone database from one DNS server to another. This is typically done to ensure name resolution availability and DNS server fault tolerance. Given the critical nature of DNS name resolution in a Windows Server 2003 environment, using a single server to support name resolution is a bad idea. If that server is not responding or is off the network, queries for names in the zone can fail. However, if you are using multiple DNS servers for high availability, you need a mechanism to allow the primary master DNS server (the only server with a read/write copy of the zone database) to replicate and synchronize the zone database on all the DNS servers that host the zone.

Windows Server 2003 supports incremental zone transfers by DNS servers. When a new DNS server is added as a host of a zone, a full transfer of the zone database is done. After that, an incremental zone transfer transfers changes to the zone database only, as opposed to the full transfer that is required with many of the older implementations of DNS. This reduces network traffic and speeds the transfer of the zone changes.

Exam Alert: Zone Transfer Types

Two types of zone transfer are supported by Windows Server 2003: full zone transfer and incremental zone transfer. You might see these types abbreviated as AXFR (full zone transfer) and IXFR (incremental zone transfer).


DNS Server Roles

There are a number of roles that a DNS server can perform based both on configuration and on the requirements of the site or network to which the server is connected. These server roles include the following:

  • Primary master The primary master DNS server has the only read/write copy of the zone database. As a result, any updates to the zone database must be completed on this server. This is similar to the Windows NT 4.0 primary DC. The primary master server is also known as the authoritative server for the zone.

  • Secondary master A secondary master DNS server has a read-only version of the zone database. This allows it to resolve any name resolution requests, but it prevents any changes from being made to the zone database. When a secondary server starts, it contacts the name server it updates from (the authoritative server) and gets the latest copy of the zone data.

  • Caching-only server A caching-only DNS server is a DNS server that does not contain any zone information or copies of any zone database files. Instead, it builds its resolution table from the successful resolutions it has performed for its client computers.

    Note: Why Use a Caching-Only Server?

    Caching-only servers are useful for several reasons. They do not generate any zone transfer traffic, which can be useful for keeping unneeded traffic off slow WAN links, and they can be placed on the far side of a slow WAN link and used to provide local DNS resolution for remote users. When a sufficient address cache has been built, calls across the WAN are virtually eliminated.


  • DNS forwarder A DNS forwarder is a DNS server that passes recursive DNS requests to another DNS server. (In other words, it forwards recursive DNS requests to another DNS server.) This can be useful if you do not have local copies of your internal DNS zone and want to have your local DNS server forward DNS queries to a central DNS server that is authoritative for the internal DNS zone. Caching-only servers make good DNS forwarders. If the DNS forwarder does not receive a valid resolution from the server to which it forwards the request, it attempts to resolve the client request itself.

  • DNS slave server A DNS slave server is a DNS forwarder server that does not try to resolve a resolution request if it doesn't receive a valid response to its forwarded DNS request. You typically see this type of DNS server implemented in conjunction with a secure Internet connection.

After you have identified the two (or more) name servers (or have arranged to have your domain hosted on someone else's DNS servers), you are ready to register your domain. To register a domain name at www.networksolutions.com, you use the process outlined in Step by Step 3.1. (This process is similar at any of the major registrars.)

Step By Step
3.1. Registering a DNS Domain

1.

Search www.networksolutions.com to find a domain name that isn't already in use. If the domain you selected is not available, the search engine suggests possible alternatives.

2.

Get the IP addresses of two domain name serversa primary (or master) and a secondary (or backup) that will be authoritative for your domain. If your ISP will be providing your name servers, obtain the IP addresses of them from your ISP. You can also use DNS names, if your DNS servers either have or will have entries in DNS.

3.

Register the domain name at www.networksolutions.com, which includes online forms for registering and changing domain names.

4.

If you actually want to register a domain (you don't need to do so as part of this exercise), you need to pay the registration fee, which varies depending on the options you select.

Note: Active Directory and DNS Domains

Because of Active Directory's critical reliance on the underlying DNS infrastructure, it is a good idea to use a registered DNS name whenever you create a Windows Server 2003 network infrastructure. This ensures that your rights to use that name will never be in question. Conversely, you can also opt to create a private namespace on your internal network using a TLD such as local, corp, or int. In reality, most organizations do not actually use the same exact namespace, such as quepublishing.com, both internally and externally. Externally, quepublishing.com might be a good namespace, but internally, it might be implemented as corp.quepublishing.com or quepublishing.corp, depending on the requirements and desires of the architects planning and implementing the solution.


The Name Resolution Process

When you've registered a domain and you understand the DNS hierarchy, the next step is to understand how DNS works. In other words, after you enter a hostname, how does it get translated to an IP address?

The DNS name server resolves a name to an IP address by using the following process:

1.

The client computer makes a request to the local DNS server. This generally occurs when an application tries to make a connection by using a hostname, such as when you enter www.quepublishing.com into a Web browser and the resolution is not found in the client's DNS cache.

2.

The DNS server looks in a local memory cache for names it has recently resolved. If the requested name is found in the local cache, the name server returns the IP address the client computer requires. Most DNS servers cache both local and remote domain names in memory, so even a DNS request for a host on your local network may be in cache.

3.

The name server looks in the DNS server's host tables to see if there is a static entry (or, in the case of DDNS, a dynamic entry) for the hostname-to-IP address lookup. If an entry exists, the DNS server forwards the IP address to the client computer.

4.

If the request has not been resolved, the name server refers the request to a root name server. (Root name servers support the root of the namespace hierarchy.) At present, 13 computers support the root domain.

5.

The root name server refers the request to a name server for the TLD in the hostname. (For example, if you have requested a host address for the quepublishing.com domain, the root name server forwards the request to the quepublishing.com DNS server.) The TLD name server refers the request to a name server for the second-level domain in the hostname, and so on, until a name server is encountered that can resolve the complete hostname.

6.

The first name server that can resolve the hostname to an IP address reports the IP address to the client computer.

Note: How Root Servers Find a Domain

When you register a domain, you are required to provide the names and addresses of two (or more) DNS servers that will be providing DNS services for the domain. The root name servers have access to these names and addresses and thus know where to send the requests.


For the process to work in your environment, you need to ensure the following are true:

1.

Make sure that your network has at least one name server, and preferably more than one. These name servers can be ones that you configure and implement, or they can be those provided by your ISP.

2.

Make sure your client computers are all configured to use these servers for DNS lookups.

The rest of the process generally just works. You do not need to maintain the root name servers list or the lookup process, although the list of root name servers is typically updated in service packs if any changes have occurred.

Reverse Lookups

We have discussed how to get the most common form of DNS lookups, known as forward lookups, in which you enter a name and the DNS server returns the IP address. As mentioned earlier in this chapter, there is another kind of lookup, known as a reverse lookup. A reverse lookup works much as the name implies: You query the DNS server with an IP address, and it returns (if there is an entry) the DNS name for that host. The ability to perform a reverse lookup can be useful if you are trying to keep track of network usage, trying to track down a host that is causing problems on the network, or trying to verify the identity of a host. At one time, it was popular to use reverse lookups for the downloading of 128-bit software to ensure that the user attempting to download the software was within the United States or Canada. The different record types are discussed later in this chapter, in the "DNS Record Types" section, but for now, it is important for you to know that reverse lookup tables use PTR records to resolve IP addresses to names. (A PTR record is a pointer to a locationan FQDNin the DNS domain.)

Note: Reverse Lookups and the nslookupCommand

If you want to be able to correctly and completely use the nslookup command, you'll need to have correctly configured and populated reverse lookup zones on your DNS servers.


Exam Alert: The Function of the Reverse Lookup Table

Because they are used less and thus are less understood than forward lookup tables, reverse lookup tables are an excellent topic for exam questions.


SPAM Emails and Reverse Lookups

In today's world, you are likely to find that you are using reverse lookups in the fight against spam, also known as UCE (unsolicited commercial email). Email servers use many tools to reduce the volume of spam; one tool is the reverse lookup, which email servers use to verify the validity of an email domain. When the mail server receives an email message, it checks whether the reverse lookup of the originating IP address matches the domain portion of the email address. If the two do not agree, the filter rejects the email message because this typically indicates that the return address of the email is a fake, commonly referred to as a spoofed address. A lot of spammers have used fictitious or false domains in an attempt to hide their real identities.

Spam has become virtually ubiquitous to anyone with an Internet email address, and the flood seems to increase with each passing year. In addition to being annoying for the user, it also eats up significant amounts of network bandwidth and frequently contains false, misleading, or obscene content.

What does this mean to you? If you are setting up DNS on the Internet and want to be able to send and receive email from that domain, you need to be sure to include a reverse zone for your mail servers. Otherwise, you can expect your mail to be filtered out as spam in many instances.

The naming convention for a reverse lookup zone is this:

<first octets of the IP address (reversed)>.in-addr.arpa


Thus, the address of the reverse table for the IP network 205.133.113.87 is 113.133.205.in-addr.arpa.

It is important to know that the Active Directory Installation Wizard does not automatically add a reverse lookup zone and PTR resource records to the server. You need to add them manually because it is possible that another server may control the reverse lookup zone. You will want to add a reverse lookup zone if this is not the case. Although a reverse lookup zone is not necessary for Active Directory to work, it is useful for the reasons listed previously.

DNS Record Types

Before we continue our discussions of DNS, you should take a quick look at Table 3.1, which lists the different types of records you can create in a DNS domain in Windows Server 2003. In the table, you will also find the pertinent RFC for each type, which can help you do additional research.

Table 3.1. DNS Record Types

Record Type

RFC

Description

AFSDB

RFC 1183

Andrew File System Database Server record. An AFSDB entry indicates the location of either an AFS volume location server or a Distributed Computing Environment (DCE) server.

CNAME

RFC 1035

Canonical Name record. A CNAME entry indicates an alias domain name for a name already specified as another resource type in this zone. CNAME is the acronym for canonical name.

ATMA

RFC 2601

ATM Address record. An ATMA record maps a DNS name to an ATM address.

A

RFC 1035

Address record. An A record maps a DNS name to an IP version 4 address.

AAAA

RFC 1886

AAAA record. An AAAA record is similar to the A record. It is used to map a DNS name to an IP (version 6) address.

ISDN

RFC 1183

Integrated Services Digital Network record. An ISDN record maps a DNS name to an ISDN telephone number.

MX

RFC 1035

Mail Exchanger record. An MX record is used to provide message routing to a specific mail exchanger host for a specific DNS name.

MG

RFC 1035

Mail Group record. An MG record is used to add mailbox records as members of a domain mailing group.

MB

RFC 1035

Mailbox record. An MB record maps a specified domain mailbox name to the host that hosts the mailbox.

MINFO

RFC 1035

Mailbox or Mailing List Information record. An MINFO record specifies a domain mailbox name to contact. It can also specify a mailbox for error messages.

PTR

RFC 1035

Pointer record. A PTR record points in the domain. This is typically used for reverse lookups or IP-address-to-DNS-name lookups.

MR

RFC 1035

Renamed Mailbox record. An MR record is used to specify a domain mailbox that is the proper rename of an existing mailbox record.

RP

RFC 1183

Responsible Person record. An RP record specifies the domain mailbox for a responsible person for which text (TXT) records exist.

TXT

RFC 1035

Text record. A TXT record is used to hold a string of characters that serve as descriptive text to be associated with a specific DNS name.

RT

RFC 1183

Route-through record. An RT record provides an intermediate route through binding for internal hosts that do not have their own direct WAN address.

SRV

RFC 2052

Service record. An SRV record allows administrators to use several servers for a single DNS domain, to easily move a TCP/IP service from host to host, and to designate primary and backup service hosts.

WKS

RFC 1035

Well-known service record. A WKS record is used to describe well-known TCP/IP services supported by a particular protocol (that is, TCP or UDP) on a specific IP address.

X25

RFC 1183

X25 record. An X25 record is used to map a DNS name to a Public Switched Telephone Network (PSTN) address.

SOA

RFC 1035

Start of Authority record. An SOA is the first resource record in each correctly configured zone. It contains information about the zone and tells the DNS server that it is authoritative for a zone.


Exam Alert: Don't Memorize the Table of DNS Record Types

Although you must understand the commonly used DNS record types, uncommon entries such as the Andrew File System database server record will not likely be on the exam. The most commonly used record types are A, CNAME, MX, PTR, SRV, and SOA.


DNS Naming Conventions

Table 3.2 shows the restrictions for creating a DNS name and an FQDN.

Table 3.2. DNS Name Restrictions

Restriction

Standard DNS

DNS in Windows Server 2003 (As Well As Windows 2000)

Characters

Supports RFC 1123 permits A to Z, a to z, 0 to 9, and the hyphen (-).

Supports several different standards, including the RFC 1123 standard, RFC 2181, and the character set specified in, which RFC 2044 (UTF-8).

FQDN length

63 bytes per label and 255 bytes for a whole FQDN

63 bytes per label and 255 bytes for a whole FQDN. DCs are limited to 155 bytes for an FQDN.


The Windows Server 2003 DNS Server Service Supports Additional Standards

Microsoft has one problem with its direction of a DNS-based directory service, and it has been a problem for years. NetBIOS, the legacy Microsoft naming mechanism, does not conform to the naming standards in RFC 1123. This means that in some environments, companies could be forced to rename all their Microsoft devices if they want to move to a naming standard supported by Active Directory. To avoid this, Microsoft has included support for RFCs 2181 and 2044, which allows legacy NetBIOS names to be supported under DNS. An example of a character supported by Windows Server 2003 DNS but not by other DNS implementations is the _ (underscore) character, used commonly in NetBIOS naming as a separator; it is not valid under many DNS implementations.

There's a catch to Microsoft's proposed support for RFCs 2181 and 2044, however. If you move to a naming convention that takes advantage of the new standards, you might run into problems with non-Windows Server 2003 DNS servers, including Windows NT 4.0 DNS servers. Most servers do not support the standards Microsoft is proposing. The reason for this is that RFC 2044 calls for the support of the character-encoding Unicode Translation Format 8 (UTF-8). UTF-8 supports characters from a variety of foreign languages that are not supported by some non-Windows 2000/Server 2003 versions of DNS.




MCSA(s)MCSE 70-291(c) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
MCSA/MCSE 70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam Prep)
ISBN: 0789736497
EAN: 2147483647
Year: 2006
Pages: 196
Authors: Will Schmied

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net