SV_RFC1034_4_3_5_ZoneTransfer - Zone maintenance and transfers
Verify that a NUT starts zone maintenance and transfers as follows:
- After editing, the administrator signals the master server to load the new zone.
- The other non-master or secondary servers for the zone periodically check for changes
- (at a selectable interval) and obtain new zone copies when changes have been made.
- To detect changes, secondaries just check the SERIAL field of the SOA for the zone.
- Whenever a new zone is loaded in a secondary, the secondary waits REFRESH seconds
- before checking with the primary for a new serial.
- If the serial field in the secondary's zone copy is equal to the serial returned by the primary,
- then no changes have occurred, and the REFRESH interval wait is restarted.
Server (Secondary)
SV_RFC1034_4_3_5_ZoneTransfer.seq [-tooloption ...]: KOI tool option
See also DNSConfig.pm
- Network Topology
Net-y -----------+--------------------------------------------- 3ffe:501:ffff:101::/64
| 192.168.1/24
|
| sec.example.com domain
Router (TN) DNS Server7
|3ffe:501:ffff:100::1 |3ffe:501:ffff:100::31
|192.168.0.1 |192.168.0.31
| |
| |
Net-z --+--------+-----------------+-----+------------------+-- 3ffe:501:ffff:100::/64
| | | 192.168.0/24
| | |
DNS Server1 (NUT) DNS Client1 (TN) DNS Client2 (TN)
3ffe:501:ffff:100::XXXX 3ffe:501:ffff:100::20 3ffe:501:ffff:100::21
192.168.0.10 192.168.0.20 192.168.0.21,22
XXXX: EUI64
- Setup
- Set the DNS Server1's (NUT) address as above mentioned Network Topology.
- Configure the Server1's: (NUT)
- zone file to response query from TN.
- configuration file as secondary server about sec.example.com zone.
- disable notify function.
- Example of root server list:
- For IPv4:
. 3600000 IN NS A.ROOT.NET.
A.ROOT.NET. 3600000 A 192.168.1.20
- For IPv6:
. 3600000 IN NS A.ROOT.NET.
A.ROOT.NET. 3600000 AAAA 3ffe:501:ffff:101::20
- Example of example.com zone file:
$TTL 86400 ; TTL of 1 day
@ IN SOA NS1.example.com. root.example.com. (
2005081600 ; serial
3600 ; refresh every 1 hr
900 ; retry every 15 min
604800 ; expire after a week
3600 ; Minimum TTL of a 1 hr
)
;
IN NS NS1.example.com.
NS1 IN A 192.168.0.10
;
A IN A 192.168.1.10
- Example of DNS server configuration for secondary:
zone "sec.example.com" {
type slave;
masters {192.168.0.31;};
file "s/sec.example.com";
};
This test sequence is following.
DNS Client1 (TN) DNS Server1 (NUT) DNS Server7 (TN)
| | |
| | |
| |----------------------------->|
| | 1. Standard query |
| | QNAME = sec.example.com |
| | QTYPE = SOA (0x0006) |
| | |
| |<-----------------------------|
| | 2. Standard query response |
| | QNAME = sec.example.com |
| | QTYPE = SOA (0x0006) |
| | ANSWER Name |
| | = sec.example.com |
| | ANSWER Type |
| | = SOA (0x0006) |
| | ANSWER TTL |
| | = 300 |
| | ANSWER MNAME |
| | = NS7.sec.example.com |
| | ANSWER Rname |
| | = root.sec.example.com |
| | ANSWER SERIAL |
| | = 1 |
| | ANSWER REFRESH |
| | = 300sec |
| | ANSWER RETRY |
| | = 30sec |
| | ANSWER EXPIRE |
| | = 600sec |
| | ANSWER MINIMUM |
| | = 300sec |
| | AUTHORITY Name |
| | = sec.example.com |
| | AUTHORITY Type |
| | = NS (0x0002) |
| | AUTHORITY Name Server |
| | = NS7.sec.example.com |
| | ADDITIONAL Name |
| | = NS7.sec.example.com |
| | ADDITIONAL Type |
| | = A (0x0001) |
| | ADDITIONAL Address |
| | = 192.168.0.31 |
| | |
| |----------------------------->|
| | 3. Standard query (using TCP)|
| | QNAME = sec.example.com |
| | QTYPE = AXFR (0x00FC) |
| | |
| |<-----------------------------|
| | 4. Standard query response |
| | (using TCP) |
| | QNAME = sec.example.com |
| | QTYPE = AXFR (0x00FC) |
| | ANSWER Name |
| | = sec.example.com |
| | ANSWER Type |
| | = SOA (0x0006) |
| | ANSWER TTL |
| | = 300 |
| | ANSWER MNAME |
| | = NS7.sec.example.com |
| | ANSWER Rname |
| | = root.sec.example.com |
| | ANSWER SERIAL |
| | = 1 |
| | ANSWER REFRESH |
| | = 300sec |
| | ANSWER RETRY |
| | = 30sec |
| | ANSWER EXPIRE |
| | = 600sec |
| | ANSWER MINIMUM |
| | = 300sec |
| | |
| | ANSWER Name |
| | = sec.example.com |
| | ANSWER Type |
| | = NS (0x0002) |
| | ANSWER Name |
| | = NS7.sec.example.com |
| | |
| | ANSWER Name |
| | = CL2.sec.example.com |
| | ANSWER Type |
| | = A (0x0001) |
| | ANSWER Address |
| | = 192.168.0.21 |
| | |
| | ANSWER Name |
| | = CL2.sec.example.com |
| | ANSWER Type |
| | = AAAA (0x001C) |
| | ANSWER Address |
| | = 3ffe:501:ffff:100::21 |
| | |
| | ANSWER Name |
| | = NS7.sec.example.com |
| | ANSWER Type |
| | = A (0x0001) |
| | ANSWER Address |
| | = 192.168.0.31 |
| | |
| | ANSWER Name |
| | = NS7.sec.example.com |
| | ANSWER Type |
| | = AAAA (0x001C) |
| | ANSWER Address |
| | = 3ffe:501:ffff:100::31 |
| | |
| | ANSWER Name |
| | = sec.example.com |
| | ANSWER Type |
| | = SOA (0x0006) |
| | ANSWER TTL |
| | = 300 |
| | ANSWER MNAME |
| | = NS7.sec.example.com |
| | ANSWER Rname |
| | = root.sec.example.com |
| | ANSWER SERIAL |
| | = 1 |
| | ANSWER REFRESH |
| | = 300sec |
| | ANSWER RETRY |
| | = 30sec |
| | ANSWER EXPIRE |
| | = 600sec |
| | ANSWER MINIMUM |
| | = 300sec |
| | |
|----------------------------->| |
| 5. Send standard query | |
| RD = 0 | |
| QNAME = CL2.sec.example.com | |
| QTYPE = A | |
| | |
|<-----------------------------| |
| 6. Standard query response | |
| AA = 0 | |
| RD = 0 | |
| QNAME = CL2.sec.example.com | |
| QTYPE = A | |
| ANSWER Name | |
| = CL2.sec.example.com | |
| ANSWER Type | |
| = A (0x0001) | |
| ANSWER Address | |
| = 192.168.0.21 | |
| | |
| AUTHORITY Name | |
| = sec.example.com | |
| AUTHORITY Type | |
| = NS (0x0002) | |
| AUTHORITY Name Server | |
| = NS7.sec.example.com | |
| | |
| ADDITIONAL Name | |
| = NS7.sec.example.com | |
| ADDITIONAL Type | |
| = A (0x0001) | |
| ADDITIONAL Address | |
| = 192.168.0.31 | |
| | |
| ADDITIONAL Name | |
| = NS7.sec.example.com | |
| ADDITIONAL Type | |
| = AAAA (0x001C) | |
| ADDITIONAL Address | |
| = 3ffe:501:ffff:100::31 | |
| | |
| | |
| | (REFRESH (5 minutes) interval|
| | expired after sent zone |
| | information) |
| | |
| |----------------------------->|
| | 7. Standard query |
| | same as above No.1 |
| | |
| |<-----------------------------|
| | 8. Standard query response |
| | same as above No.2 |
| | |
| |-------------> X |
| | 9. Standard query |
| | QNAME = sec.example.com |
| | QTYPE = AXFR (0x00FC) |
| | |
| | (After REFRESH (5 minutes) |
| | expired) |
| | |
| |----------------------------->|
| | 10. Standard query |
| | same as above No.1 |
| | |
| |<-----------------------------|
| | 11. Standard query response |
| | same as above No.2 |
| | except serial number. |
| | ANSWER SERIAL |
| | = 2 |
| | |
| |----------------------------->|
| | 12. Standard query |
| | same as above No.3 |
| | |
| |<-----------------------------|
| | 13. Standard query response |
| | same as No.4 except |
| | serial number and CL2's |
| | type A address |
| | |
| | ANSWER SERIAL |
| | = 2 |
| | |
| | and |
| | |
| | ANSWER Name |
| | = CL2.sec.example.com |
| | ANSWER Type |
| | = A (0x0001) |
| | ANSWER Address |
| | = 192.168.0.22 |
| | |
|----------------------------->| |
| 14. Send standard query | |
| same as above No.5 | |
| | |
|<-----------------------------| |
| 15. Standard query response | |
| AA = 0 | |
| RD = 0 | |
| QNAME = CL2.sec.example.com | |
| QTYPE = A | |
| ANSWER Name | |
| = CL2.sec.example.com | |
| ANSWER Type | |
| = A (0x0001) | |
| ANSWER Address | |
| = 192.168.0.22 | |
| | |
| AUTHORITY Name | |
| = sec.example.com | |
| AUTHORITY Type | |
| = NS (0x0002) | |
| AUTHORITY Name Server | |
| = NS7.sec.example.com | |
| | |
| ADDITIONAL Name | |
| = NS7.sec.example.com | |
| ADDITIONAL Type | |
| = A (0x0001) | |
| ADDITIONAL Address | |
| = 192.168.0.31 | |
| | |
| ADDITIONAL Name | |
| = NS7.sec.example.com | |
| ADDITIONAL Type | |
| = AAAA (0x001C) | |
| ADDITIONAL Address | |
| = 3ffe:501:ffff:100::31 | |
| | |
| | |
| | (REFRESH (5 minutes) interval|
| | expired after sent zone |
| | information) |
| | |
| |----------------------------->|
| | 16. Standard query |
| | same as above No.1 |
| | |
v v v
This test sequence is following.
1. DNS Server1 (NUT) transmits standard query QNAME = sec.example.com,
Type = SOA to DNS Server7 (TN). (Judgment *1)
2. DNS Server7 (TN) sends standard query response with SOA RRs to DNS Server1 (NUT).
3. DNS Server1 (NUT) transmits standard query with QNAME = sec.example.com,
Type = AXFR using TCP to DNS Server7 (TN). (Judgment *3)
4. DNS Server7 (TN) sends standard query response including all RRs about sec.example.com zone
using TCP to DNS Server1 (NUT).
5. DNS Client1 (TN) sends standard query QNAME = CL2.sec.example.com to DNS Server1 (NUT).
6. DNS Server1 (NUT) transmits standard query response ANSWER Address = 192.168.0.21
to DNS Client1 (TN). (Judgment *6)
7. After refresh time expired, DNS Server1 (NUT) transmits standard query as same as No.1. (Judgment *7)
8. DNS Server7 (TN) sends standard query response as same as No.2 to DNS Server1 (NUT).
9. DNS Server1 (NUT) doesn't sends standard query QNAME = sec.example.com,
Type = AXFR to DNS Server7 (TN). (Judgment *9)
10. After refresh time expired, DNS Server1 (NUT) transmits standard query as same as No.1. (Judgment *10)
11. DNS Server7 (TN) sends standard query response incrementing SOA's serial number to DNS Server1 (NUT).
12. DNS Server1 (NUT) transmits standard query with QNAME = sec.example.com,
Type = AXFR using TCP to DNS Server7 (TN). (Judgment *12)
13. DNS Server7 (TN) sends standard query response including all RRs about sec.example.com zone
differencing SOA's serial number and CL2.sec.example.com address using TCP to DNS Server1 (NUT).
14. DNS Client1 (TN) sends standard query as same as No.5.
15. DNS Server1 (NUT) transmits standard query response ANSWER Address = 192.168.0.22
to DNS Client1 (TN). (Judgment *15)
16. After refresh time expired, DNS Server1 (NUT) transmits standard as same as No.1. (Judgment *16)
- Packet Description
- 1st packet.
Standard query from DNS Server1 (NUT) to Server7 (TN)
|
IP Header |
Source Address |
NUT_NETZ |
Destination Address |
SV7_NETZ |
UDP Header |
Src Port |
ANY |
Dst Port |
53 |
DNS Header |
ID |
ANY |
QR |
0 |
OPCODE |
0 |
AA |
0 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
0 |
NSCOUNT |
0 |
ARCOUNT |
0 |
DNS Question section |
QNAME |
sec.example.com |
QTYPE |
SOA (0x0006) |
QCLASS |
IN (0x0001) |
- 2nd packet.
Standard query response from DNS Server7 (TN) to Server1 (NUT)
|
IP Header |
Source Address |
SV7_NETZ |
Destination Address |
NUT_NETZ |
UDP Header |
Src Port |
53 |
Dst Port |
Value that NUT uses |
DNS Header |
ID |
Value that NUT uses |
QR |
1 |
OPCODE |
0 |
AA |
1 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
1 |
NSCOUNT |
1 |
ARCOUNT |
2 |
DNS Question section |
QNAME |
sec.example.com |
QTYPE |
SOA (0x0006) |
QCLASS |
IN (0x0001) |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C)
|
TYPE |
SOA (0x0006) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
33 |
MNAME |
NS7.sec.example.com (NS7 + Pointer 0xC00C) |
RNAME |
root.sec.example.com (root + Pointer 0xC00C) |
SERIAL |
1 |
REFRESH |
300sec |
RETRY |
30sec |
EXPIRE |
600sec |
MINIMUM |
300sec |
DNS Authority section |
NAME |
sec.example.com (Pointer 0xC00C) |
TYPE |
NS (0x0002) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
2 |
NSDNAME |
NS7.sec.example.com (Pointer 0xC02D) |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.31 |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::31 |
- 3rd packet.
Standard query from DNS Server1 (NUT) to Server7 (TN)
|
IP Header |
Source Address |
NUT_NETZ |
Destination Address |
SV7_NETZ |
TCP Header |
Src Port |
ANY |
Dst Port |
53 |
DNS Header |
ID |
ANY |
QR |
0 |
OPCODE |
0 |
AA |
0 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
0 |
NSCOUNT |
0 |
ARCOUNT |
0 |
DNS Question section |
QNAME |
sec.example.com |
QTYPE |
AXFR (0x00FC) |
QCLASS |
IN (0x0001) |
- 4th packet.
Standard query response from DNS Server7 (TN) to Server1 (NUT)
|
IP Header |
Source Address |
NUT_NETZ |
Destination Address |
SV7_NETZ |
TCP Header |
Src Port |
53 |
Dst Port |
Value that NUT uses |
DNS Header |
ID |
Value that NUT uses |
QR |
0 |
OPCODE |
0 |
AA |
1 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
7 |
NSCOUNT |
0 |
ARCOUNT |
0 |
DNS Question section |
QNAME |
sec.example.com |
QTYPE |
AXFR (0x00FC) |
QCLASS |
IN (0x0001) |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C)
|
TYPE |
SOA (0x0006) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
33 |
MNAME |
NS7.sec.example.com (NS7 + Pointer 0xC00C) |
RNAME |
root.sec.example.com (root + Pointer 0xC00C) |
SERIAL |
1 |
REFRESH |
300sec |
RETRY |
30sec |
EXPIRE |
600sec |
MINIMUM |
300sec |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C) |
TYPE
|
NS (0x0002) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
2 |
NSDNAME |
NS7.sec.example.com (Pointer 0xC02D) |
DNS Answer section |
NAME |
CL2.sec.example.com (CL2 + Pointer 0xC00C) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.21 |
DNS Answer section |
NAME |
CL2.sec.example.com (Pointer 0xC05C) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::21 |
DNS Answer section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.31 |
DNS Answer section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::31 |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C)
|
TYPE |
SOA (0x0006) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
24 |
MNAME |
NS7.sec.example.com (Pointer 0xC02D) |
RNAME |
root.sec.example.com (Pointer 0xC033) |
SERIAL |
1 |
REFRESH |
300sec |
RETRY |
30sec |
EXPIRE |
600sec |
MINIMUM |
300sec |
- 5th packet.
Standard query from DNS Client1 (TN) to Server1 (NUT)
|
IP Header |
Source Address |
CL1_NETZ |
Destination Address |
NUT_NETZ |
UDP Header |
Src Port |
1000 |
Dst Port |
53 |
DNS Header |
ID |
0x1000 |
QR |
0 |
OPCODE |
0 |
AA |
0 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
0 |
NSCOUNT |
0 |
ARCOUNT |
0 |
DNS Question section |
QNAME |
CL2.sec.example.com |
QTYPE |
A (0x0001) |
QCLASS |
IN (0x0001) |
- 6th packet.
Standard query response from DNS Server1 (NUT) to Client1 (TN)
|
IP Header |
Source Address |
NUT_NETZ |
Destination Address |
CL1_NETZ |
UDP Header |
Src Port |
53 |
Dst Port |
1000 |
DNS Header |
ID |
0x1000 |
QR |
1 |
OPCODE |
0 |
AA |
1 |
TC |
0 |
RD |
0 |
RA |
ANY |
Z |
ANY |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
1 |
NSCOUNT |
1 |
ARCOUNT |
2 |
DNS Question section |
QNAME |
CL2.sec.example.com
|
QTYPE |
A (0x0001) |
QCLASS |
IN (0x0001) |
DNS Answer section |
NAME |
CL2.sec.example.com (Pointer 0xC00C)
|
TYPE |
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.21 |
DNS Authority section |
NAME |
sec.example.com (Pointer 0xC010) |
TYPE |
NS (0x0002) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
6 |
NSDNAME |
NS7.sec.example.com (NS7 + Pointer 0xC010) |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC041) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.30 |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC041) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::31 |
- 7th packet.
- same as No.1 packet.
- 8th packet.
- same as No.2 packet.
- 9th packet.
- Nothing
- 10th packet.
- same as No.1 packet.
- 11th packet.
Standard query response from DNS Server7 (TN) to Server1 (NUT)
|
IP Header |
Source Address |
SV7_NETZ |
Destination Address |
NUT_NETZ |
UDP Header |
Src Port |
53 |
Dst Port |
Value that NUT uses |
DNS Header |
ID |
Value that NUT uses |
QR |
1 |
OPCODE |
0 |
AA |
1 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
1 |
NSCOUNT |
1 |
ARCOUNT |
2 |
DNS Question section |
QNAME |
sec.example.com |
QTYPE |
SOA (0x0006) |
QCLASS |
IN (0x0001) |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C)
|
TYPE |
SOA (0x0006) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
33 |
MNAME |
NS7.sec.example.com (NS7 + Pointer 0xC00C) |
RNAME |
root.sec.example.com (root + Pointer 0xC00C) |
SERIAL |
2 |
REFRESH |
300sec |
RETRY |
30sec |
EXPIRE |
600sec |
MINIMUM |
300sec |
DNS Authority section |
NAME |
sec.example.com (Pointer 0xC00C) |
TYPE |
NS (0x0002) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
6 |
NSDNAME |
NS7.sec.example.com (Pointer 0xC02D) |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.31 |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::31 |
- 12th packet.
- same as No.3 packet.
- 13th packet.
Standard query response from DNS Server7 (TN) to Server1 (NUT)
|
IP Header |
Source Address |
NUT_NETZ |
Destination Address |
SV7_NETZ |
TCP Header |
Src Port |
53 |
Dst Port |
Value that NUT uses |
DNS Header |
ID |
Value that NUT uses |
QR |
0 |
OPCODE |
0 |
AA |
1 |
TC |
0 |
RD |
0 |
RA |
0 |
Z |
0 |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
7 |
NSCOUNT |
0 |
ARCOUNT |
0 |
DNS Question section |
QNAME |
sec.example.com |
QTYPE |
AXFR (0x00FC) |
QCLASS |
IN (0x0001) |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C)
|
TYPE |
SOA (0x0006) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
33 |
MNAME |
NS7.sec.example.com (NS7 + Pointer 0xC00C) |
RNAME |
root.sec.example.com (root + Pointer 0xC00C) |
SERIAL |
2 |
REFRESH |
300sec |
RETRY |
30sec |
EXPIRE |
600sec |
MINIMUM |
300sec |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C) |
TYPE
|
NS (0x0002) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
2 |
NSDNAME |
NS7.sec.example.com (Pointer 0xC02D) |
DNS Answer section |
NAME |
CL2.sec.example.com (CL2 + Pointer 0xC00C) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.22 |
DNS Answer section |
NAME |
CL2.sec.example.com (Pointer 0xC05C) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::21 |
DNS Answer section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.31 |
DNS Answer section |
NAME |
NS7.sec.example.com (Pointer 0xC02D) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::31 |
DNS Answer section |
NAME |
sec.example.com (Pointer 0xC00C)
|
TYPE |
SOA (0x0006) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
24 |
MNAME |
NS7.sec.example.com (Pointer 0xC02D) |
RNAME |
root.sec.example.com (Pointer 0xC033) |
SERIAL |
2 |
REFRESH |
300sec |
RETRY |
30sec |
EXPIRE |
600sec |
MINIMUM |
300sec |
- 14th packet.
- same as No.5 packet, but ID=0x2000.
- 15th packet.
Standard query response from DNS Server1 (NUT) to Client1 (TN)
|
IP Header |
Source Address |
NUT_NETZ |
Destination Address |
CL1_NETZ |
UDP Header |
Src Port |
53 |
Dst Port |
1000 |
DNS Header |
ID |
0x2000 |
QR |
1 |
OPCODE |
0 |
AA |
1 |
TC |
0 |
RD |
0 |
RA |
ANY |
Z |
ANY |
RCODE |
0 |
QDCOUNT |
1 |
ANCOUNT |
1 |
NSCOUNT |
1 |
ARCOUNT |
2 |
DNS Question section |
QNAME |
CL2.sec.example.com
|
QTYPE |
A (0x0001) |
QCLASS |
IN (0x0001) |
DNS Answer section |
NAME |
CL2.sec.example.com (Pointer 0xC00C)
|
TYPE |
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.22 |
DNS Authority section |
NAME |
sec.example.com (Pointer 0xC010) |
TYPE |
NS (0x0002) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
6 |
NSDNAME |
NS7.sec.example.com (NS7 + Pointer 0xC010) |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC041) |
TYPE
|
A (0x0001) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
4 |
ADDRESS |
192.168.0.31 |
DNS Additional section |
NAME |
NS7.sec.example.com (Pointer 0xC041) |
TYPE
|
AAAA (0x001C) |
CLASS |
IN (0x0001) |
TTL |
300sec |
RDLENGTH |
16 |
ADDRESS |
3ffe:501:ffff:100::31 |
- 16th packet.
- same as No.1 packet.
- Exp.
NUT_NETZ |
DNS Server1's (NUT) Net-z address |
CL1_NETZ |
DNS Client1's (TN) Net-z address |
SV7_NETZ |
DNS Server7's (TN) Net-z address |
1. Received standard query with Type=SOA.
3. Received standard query with Type=AXFR using TCP
6. Received standard query response including Answer address 192.168.0.21.
7. Received standard query with Type=SOA after REFRESH time expired.
9. Doesn't receive standard query with Type=SOA.
10. Received standard query with Type=SOA after REFRESH time expired.
12. Received standard query with Type=AXFR using TCP.
15. Received standard query response including Answer address 192.168.0.22.
16. Received standard query with Type=SOA after REFRESH time expired.
None
RFC1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
4. NAME SERVERS
4.3.5. Zone maintenance and transfers