9.5 Subdomains of in-addr.arpa Domains


DNS on Windows 2000, 2nd Edition
By Matt Larson, Cricket Liu
Table of Contents
Chapter 9.  Parenting

9.5 Subdomains of in-addr.arpa Domains

Forward-mapping domains aren't the only domains you can divide into subdomains and delegate. If your in-addr.arpa namespace is large enough, you may need to divide it, too. Typically, you divide the domain that corresponds to your network number into subdomains that correspond to your subnets. How that works depends on the type of network you have and on your network's subnet mask.

9.5.1 Subnetting on an Octet Boundary

Since Movie U. has just three /24 (Class C- sized ) networks, one per segment, there's no particular need to subnet those networks. However, our sister university, Altered State, has a Class B-sized network, 172.20/16. Their network is subnetted between the third and fourth octet of the IP address; that is, their subnet mask is They've already created a number of subdomains of their domain: altered.edu , including fx.altered.edu (okay, we copied them); makeup .altered.edu ; and foley.altered.edu . Since each of these departments also runs its own subnet (their Special Effects department runs subnet 172.20.2/24, Makeup runs 172.20.15/24, and Foley runs 172.20.25/24), they'd like to divvy up their in-addr.arpa namespace appropriately, too.

Delegating in-addr.arpa subdomains is no different from delegating subdomains of forward-mapping domains. First, they or their departments create three new zones, 2.20.172.in-addr.arpa , 15.20.172.in-addr.arpa , and 25.20.172.in-addr.arpa. The 20.172.in-addr.arpa administrators also need to add the NS records with the New Delegation Wizard, as we described in the fx.movie.edu example earlier in this chapter.

After running the New Delegation Wizard, the NS records in 20.172.in-addr.arpa.dns would look something like the following partial listing of the file's contents:

 ; ;  Delegated sub-zone:  15.20.172.in-addr.arpa. ; 15                               NS     prettywoman.makeup.altered.edu. prettywoman.makeup.altered.edu.  A 15                               NS     priscilla.makeup.altered.edu. priscilla.makeup.altered.edu.    A ;  End delegation ; ;  Delegated sub-zone:  2.20.172.in-addr.arpa. ; 2                                NS     gump.fx.altered.edu. gump.fx.altered.edu.             A 2                                NS     toystory.fx.altered.edu. toystory.fx.altered.edu.         A ;  End delegation ; ;  Delegated sub-zone:  25.20.172.in-addr.arpa. ; 25                               NS     blowup.foley.altered.edu. blowup.foley.altered.edu.        A 25                               NS     muppetshow.foley.altered.edu. muppetshow.foley.altered.edu.    A ;  End delegation 

The Altered State administrators needed to use the fully qualified domain names of the name servers in the NS records because the default origin in this file is 20.172.in-addr.arpa . Strictly speaking, those glue address records aren't needed since the names of the name servers to which they delegated the zone weren't in the delegated zones. We were a little chagrined to discover that the DNS console forced us to enter IP addresses for these name servers and then put them in 20.172.in-addr.arpa.dns . The server even includes them in a zone transfer of the 20.172.in-addr.arpa zone. Since the glue records are not required, all that is unnecessary.

9.5.2 Subnetting on a Nonoctet Boundary

What do you do about networks that aren't subnetted neatly on octet boundaries, like subnetted /24 (Class C-sized) networks? In these cases, you can't delegate along lines that match the subnets. This forces you into one of two situations: you have multiple subnets per in-addr.arpa zone or you have multiple in-addr.arpa zones per subnet. Neither is particularly pleasing. Class A and B networks

Let's take the case of the /8 (Class A-sized) network 15/8, subnetted with the subnet mask (a 13-bit subnet field and an 11-bit host field, or 8,192 subnets of 2,048 hosts ). In this case, the subnet, for example, extends from to Therefore, the delegation for that single subdomain in db.15 , the zone data file for 15.in-addr.arpa , might look like this:

 200.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 200.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 201.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 201.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 202.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 202.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 203.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 203.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 204.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 204.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 205.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 205.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 206.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 206.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 207.1.15.in-addr.arpa.    86400    IN    NS    ns-1.cns.hp.com. 207.1.15.in-addr.arpa.    86400    IN    NS    ns-2.cns.hp.com. 

That's a lot of delegation for one subnet!

You'd set this up with the DNS console by adding two levels of subdomains under 15.in-addr.arpa and then running the New Delegation Wizard (eight times!) with the 1.15.in-addr.arpa zone selected. /24 (Class C-sized) networks

In the case of a subnetted /24 (Class C-sized) network, say 192.253.254/24, subnetted with the mask, you have a single in-addr.arpa zone, 254.253.192.in-addr.arpa , that corresponds to subnets,,, and This can be a problem if you want to let different organizations manage the reverse-mapping information that corresponds to each subnet. You can solve this in one of three ways, none of which is pretty. Solution 1

The first solution is to administer the 254.253.192.in-addr.arpa zone as a single entity and not even try to delegate. This requires either cooperation between the administrators of the four subnets involved or the use of a tool like the DNS console to allow each of the four administrators to take care of his own data. Solution 2

The second solution is to delegate at the fourth octet. That's even nastier than the /8 delegation we just showed. You'll need at least a couple of NS records per IP address. To set this up with the DNS console, you'd need to create the 254.253.192.in-addr.arpa zone and run the new delegation wizard 254 times, one for each usable value in the fourth octet. Here's how the 254.253.192.in-addr.arpa.dns file might end up looking (we've removed the unnecessary glue A records for clarity and brevity):

 ; ;  Delegated sub-zone: ; 1          IN          NS          ns1.foo.com. 1          IN          NS          ns2.foo.com. ;  End delegation ; ;  Delegated sub-zone: ; 2          IN          NS          ns1.foo.com. 2          IN          NS          ns2.foo.com. ;  End delegation ... ;  Delegated sub-zone: ; 65          IN          NS          gw.bar.com. 65          IN          NS          relay.bar.com. ;  End delegation ;  Delegated sub-zone: ; 66          IN          NS          gw.bar.com. 66          IN          NS          relay.bar.com. ;  End delegation ... ; ; Delegated sub-zone: ; 129          IN          NS          mail.baz.com. 129          IN          NS          www.baz.com ;  End delegation ; ; Delegated sub-zone: ; 193          IN          NS          mail.baz.com. 192          IN          NS          www.baz.com ;  End delegation 

And so on, all the way down to . Of course, on ns1.foo.com , you'd also expect the name server to be authoritative for, and in the zone data file for , you'd find just the one PTR record (plus an SOA and two NS records):

 @    IN    SOA    ns1.foo.com.    root.ns1.foo.com.    (                          1        ; Serial                          10800    ; Refresh                          3600     ; Retry                          608400   ; Expire                          86400    ; Default TTL     IN    NS    ns1.foo.com.     IN    NS    ns2.foo.com.     IN    PTR    thereitis.foo.com. 

Note that the PTR record is attached to the zone's domain name, since the zone's domain name corresponds to just one IP address. (And, as far as we can tell, it's not possible to create a PTR record with the same name as the zoneas in the earlier example zonewith the DNS console. You have to create that zone by hand.) Now, when a 254.253.192.in-addr.arpa name server receives a query for the PTR record for , it will refer the querier to ns1.foo.com and ns2.foo.com , which will respond with the one PTR record in the zone. Solution 3

Finally, there's a clever technique that obviates the need to maintain a separate zone data file for each IP address. [2] The organization responsible for the overall /24 network creates CNAME records for each of the domain names in the zone, pointing to domain names in new subdomains, which are then delegated to the proper servers. These new subdomains can be called just about anything, but names like 0-63 , 64-127 , 128-191 , and 192-255 clearly indicate the range of addresses each subdomain will reverse map. Each subdomain then contains only the PTR records in the range for which the subdomain is named.

[2] We first saw this explained by Glen Herrmansfeldt at CalTech in the newsgroup comp.protocols.tcp-ip.domains. It's now codified as RFC 2317.

Here are the partial contents of the 254.253.192.in-addr.arpa.dns file:  IN  CNAME  1.0-  IN  CNAME  2.0- ... 0-    86400    IN    NS    ns1.foo.com. 0-    86400    IN    NS    ns2.foo.com. IN  CNAME 65.64- IN  CNAME 66.64- ... 64-    86400    IN    NS    relay.bar.com. 64-    86400    IN    NS    gw.bar.com.  IN  CNAME  129.128- arpa.  IN  CNAME  130.128- arpa. ... 128-    86400    IN    NS    mail.baz.com. 128-    86400    IN    NS    www.baz.com. 

The zone data file for 0- , 0- , can contain just PTR records for IP addresses through

Here are the partial contents of the 0- file:

 @    IN    soa    ns1.foo.com.    root.ns1.foo.com.    (                           1       ; Serial                           10800   ; Refresh                           3600    ; Retry                           608400  ; Expire                           86400 ) ; Default TTL      IN    NS     ns1.foo.com.      IN    NS     ns2.foo.com. 1    IN    PTR    thereitis.foo.com. 2    IN    PTR    setter.foo.com. 3    IN    PTR    mouse.foo.com. ... 

The way this setup works is a little tricky, so let's go over it. A resolver requests the PTR record for , causing its local name server to go look up that record. The local name server ends up asking a 254.253.192.in-addr.arpa name server, which will respond with the CNAME record indicating that is actually an alias for 1.0- and that the PTR record is attached to that name. The response will also include NS records telling the local name server that the authoritative name servers for 0- are ns1.foo.com and ns2.foo.com . The local name server then queries either ns1.foo.com or ns2.foo.com for the PTR record for 1.0- and receives the PTR record.


DNS on Windows 2000
DNS on Windows 2000
ISBN: 0596002300
EAN: 2147483647
Year: 2001
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net