Common resources records (aka RR)

DNS lookups

The host resolution can be iterative (the client contacts each autoritative DNS down the tree) or recursive (the DNS server contacted by the client does the resolution on his behalf).

Network_DNS_101.svg

The registrars also maintain a WHOIS database that can be queried by fqdn, IP and AS.

Network_WHOIS_query.svg

Reverse lookup

Done by doing a name lookup on a hostname derived from the ip address.

Try it

Interpreting a zone file

A DNS zone is a subtree of the domain hierarchy handled by a single organisation.

subject Valid for X secs Type (always internet) RR type extra
netflix.com 600 IN SOA ns-81.awsdns-10.com. <admin mail> <zone refresh in secs> ...
netflix.com 59 IN NS ns-81.awsdns-10.com.
netflix.com 299 IN NS ns-66.awsdns-10.com.
netflix.com 299 IN NS ns-66.awsdns-10.com.
netflix.com 59 IN TXT facebook-domain-verification=YYY
netflix.com 59 IN TXT google-site-verification=XXX
netflix.com 59 IN A 123.123.123.123
netflix.com 59 IN A 123.123.123.122
netflix.com 59 IN AAAA dead::beef

DNSSEC (cf cloudflare blog)

Note that DNS normally runs over UDP unencrypted even if a man-in-the-middle attack cannot forge records protected by signature, it can see the DNS trafic. DNS over HTTPS seems like a more secure alternative.

Extra resource records

Network_DNSSEC.svg

Note on the sequence diagram below that any dns server can provide authenticated records for a zone it does not own.

Network_DNSSEC_seq.svg

Note that NSEC3 does not mention domain names but hashes to avoid domain enumeration.