Book Image

Managing Mission - Critical Domains and DNS

By : Mark E.Jeftovic
Book Image

Managing Mission - Critical Domains and DNS

By: Mark E.Jeftovic

Overview of this book

Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers.
Table of Contents (17 chapters)
7
Types and Uses of Common Resource Records

References

  1. I can also tell you from experience that the phrase "sub-delegation" is often used. I have it on good authority (namely, every single tech reviewer of this book) that this phrase is redundant and confusing. I should also admit to having used it until now.
  2. Anestis Karasaridis, DNS Security: In Depth Vulnerability and Mitigation Solutions.
  3. https://www.theregister.co.uk/2018/04/24/myetherwallet_dns_hijack/
  4. If the nameserver is configured with minimal-responses enabled, the authoritative nameserver will only populate the AUTHORITATIVE SECTION in the case of referrals or when the data is otherwise required. The rationale behind this is to optimize performance.
  5. https://tools.ietf.org/html/draft-dnsop-refuse-any-00
  6. What we are talking about here may sound similar to Response Rate Limiting (RRL), but it isn't. We will look at RRL in Chapter 14, DNS and DDoS...