4x Affordable, 99.95% SLA, 24x& Video Support, 100+ Countires

A Comparison Of Dns Server Types Choose The Right Dns Configuration


DNS, or the Domain Name System, is an intrinsic part of how systems connect with each other to communicate on the internet. Without DNS, experts, and the people who use them, would be demanded to connect using only quantitative addresses known as IP addresses.

Besides the obvious difficulty of having to remember a huge number of complex numbers for easy tasks, communicating through IP addresses also ventures some more difficulties. Moving your website to a dissimilar entertaining provider, or moving your servers to dissimilar venues would demand you to inform every client of the brand-new area.

DNS servers, the experts that together form the system that allow us to use names instead of addresses, can server many non-identical functions, each of which can contribute to your ability to accessing servers by name.

In a preceding lead we discussed some of the basic word and ideas of the domain name system. We will assume some familiarity with the ideas covered in that article. In this lead, we will talk about some of the disparate types of DNS server setups and what the merits, use cases, and properties are of each.

The Path of a DNS Query

When a client software wants to accesses a server by its domain name, it must find out how to translate the domain name into an effective routable addresses that it can use to communicate. It needs to know this information in order to get or send information to the server.

Some applications, including most web browsers, maintain an inner cache of new queries. This is the first place the application will check, if it has this aptitude, in order to find the IP addresses of the domain in ask. If it does not find the reply to its ask here, it then asks the system resolver to find out what the addresses of the domain name is.

A resolver in general is any element that acts as a client-side contestant in a dns query. The system resolver is the resolving library that your directing system uses to seek out the reply for DNS queries. In general, system resolvers are usually what we consider receipt resolvers because they are not able of much quality beyond searching a few nonmoving records on the system (like the /etc/hosts register) and forwarding requests to another resolver.

So generally, a query goes from the client application to the system resolver, where it is then passed to a dns server that it has the addresses for. This DNS server is labelled a recursive DNS server. a recursive server is a dns server that is configured to query other DNS servers until it finds the reply to the request. It will either return the reply or an error communication to the client (the system resolver in this case, which will, in turn, pass it to the client application).

Recursive servers generally maintain a cache as well. It will check this cache first to see if it already has the reply to the query. If it does not, it will see if it has the addresses to any of the servers that command the top stage domain elements. So if the ask is for www.instance.com and it cannot find that host addresses in its cache, it will see if it has the addresses of the name servers for instance.com and if necessary, com. It will then send a query to the name server of most exact domain element it can find in order to query for more information.

If it does not find the addresses to any of these domain elements, it has to begin from the very top of the hierarchy by asking the set name servers. The set servers know the addresses of all of the TLD (top stage domain) name servers which command zones for .com, .clear, .org, etc. It will question the set servers if it knows the addresses of to www.instance.com. The set server will refer the recursive server to the name servers for the .com TLD.

The recursive server then follows the trail of forwardings to each ordered name server that has been delegated responsibility for the domain elements, until it can zero in on the accurate name server that has the full reply. It puts this reply into its cache for later queries and then returns it to the client.

As you can see from this instance, there are many dissimilar categories of servers, and they each play a dissimilar role. Let's go over the accurates of the dissimilar types of DNS servers.

Functional Differences

Some of the disagreements between DNS servers are purely structural. Most servers that are involved with implementing DNS are differentiated for definite functions. The symbol of DNS server you choose will largely be on your needs and what symbol of difficulty you are wishing to unravel.

Authoritative-Only DNS Servers

an authoritative-only DNS server is a server that only concerns itself with replying the queries for the zones that it is accountable for. Since it does not support resolve queries for outside zones, it is generally very swift and can handle many requests efficiently.

Authoritative-only servers have the following properties:

  • Very swift at answering to queries for zones it regulates. an authoritative-only server will have all of the information about the domain it is accountable for, or forwarding information for zones within the domain that have been delegated out to other name servers.
  • Will not reply to recursive queries. The very definition of an authoritative-only server is one that does not handle recursive requests. This makes it a server only and never a client in the DNS system. Any question approaching an authoritative-only server will generally be approaching from a resolver that has collected a forwarding to it, conveying that the authoritative-only server will either have the full reply, or will be able to pass a brand-new forwarding to the name server that it has delegated responsibility to.
  • Does not cache query results. Since an authoritative-only server never queries other servers for information to resolve a question, it never has the opportunity to cache results. All of the information it knows is already in its system.

Caching DNS Server

a caching DNS server is a server that handles recursive requests from cases. Almost every DNS server that the directing system's receipt resolver will contact will be a caching DNS server.

Caching servers have the merit of replying recursive requests from cases. While authoritative-only servers may be perfect for serving precise zone information, caching DNS servers are more broadly helpful from a client's orientation. They make the DNS system of the experience accessible to rather stupid client interfaces.

To evade having to take the performance knocked of issuing aggregate aspect ask to other DNS servers every moment it receives a recursive ask, the server caches its results. This allows it to have accesses to a beamy base of DNS information (the whole world's publicly accessible DNS) while handling new requests very quickly.

a caching DNS server has the following properties:

  • accesses to the whole range of public DNS data. All zone data served by publicly accessible DNS servers hooked into the international delegation tree can be approached by a caching DNS server. It knows about the set DNS servers and can intelligently follow forwardings as it receives data.
  • Ability to spoon-feed data to stupid cases. Almost every modern operating system offloads DNS resolution to dedicated recursive servers through the use of receipt resolvers. These resolving libraries simply issue a recursive request and expect to be handed back a complete answer. A caching DNS server has the exact capabilities to serve these clients. By accepting a recursive query, these servers promise to either return with an answer or a DNS error message.
  • Maintains a cache of recently questioned data. By caching the results as it collects them from other DNS servers for its client requests, a caching DNS server builds a cache for new DNS data. being on how many cases use the server, how huge the cache is, and how long the TTL data is on the DNS records themselves, this can drastically speed up DNS resolution in most cases.

Forwarding DNS Server

an alternative take on creating a cache for client appliances is through the use of a forwarding DNS server. This come adds an extra link in the series of DNS resolution by implementing a forwarding server that simply passes all requests to another DNS server with recursive aptitudes (such as a caching DNS server).

The merit of this system is that it can give you the merit of a locally accessible cache while not having to do the recursive work (which can result in more network traffic and can take up considerable resources on high traffic servers). This can also govern to some captivating trait in splitting your independent and public traffic by forwarding to disparate servers.

a forwarding DNS server has the following properties:

  • The ability to handle recursive requests without performing recursion itself. The most important property of a forwarding DNS server is that it passes requests on to another agent for resolution. The forwarding server can have minimal resources and still give fantastic ideal by supplementing its cache.
  • give a local cache at a closer network venue. Particularly if you do not feel up to building, maintaining, and obtaining a full-fledged recursive DNS success, a forwarding server can use public recursive DNS servers. It can leverage these servers while moving the capital caching venue very close to the client gagdets. This can decrease respond times.
  • Increases trait in being local domain space. By passing requests to disparate servers conditionally, a forwarding server can ensure that inner requests are served by independent servers while outer requests use public DNS.

Combination Solutions

While the above successes are built with very precise purposes in mind, it is often desirable to set up your DNS server to combine the merits of each.

a dns server may be configured to act as a recursive, caching server for a specify number of local cases, while responding only aspect, influential requests from other cases. This is a communal configuration because it allows you to respond international requests for your domain, while also allowing your local cases to utilize the server for recursive resolution.

While definite DNS program is specially designed to fulfill one accurate role, applications like Bind are incredibly flexible and can be used as crossbred successes. While in some cases striving to give too many services in an individual server can guide to performance degradation, in many cases, especially in the case of little structure, it makes the most sense to maintain an individual, all-in-one success.

Relational Differences

While the most obvious disagreements between DNS server configurations are probably structural, the relative disagreements are also extremely all-important.

Primary and Slave Servers

Given the value of DNS in making services and whole networks accessible, most DNS servers that are influential for a zone will have built-in redundancy. There are different terms for the relations between these servers, but generally, a server can either be a leader or a slave in its configuration.

Both leader and slave servers are authoritative for the zones they handle. The leader does not have any more power over the zones than the slave. The only differentiating factor between a leader and a slave server is where they read their zone files from.

A leader server reads its zone files from files on the system's disk. These are usually where the zone administrator adds, edits, or transfers the original zone files.

The slave server receives the zones that it is authoritative for through a zone transfer from one of the leader servers for the zone. Once it has these zones, it places them in a cache. If it has to restart, it first checks its cache to see if the zones inside are up-to-date. If not, it requests the updated information from the leader server.

Servers are not relegated to only be a leader or a slave for all of the zones they handle. Master or slave status is assigned on a zone-by-zone basis, so a server can be a leader for some zones and a slave for others.

DNS zones usually have at least two name servers. Any zone accountable for an internet routable zone must have at least two name servers. Often times, many more name servers are maintained in order to spread the load and increase redundancy.

Public vs Private Servers

Often, organizations use DNS both externally and internally. However the information that should be made accessible in both of these spheres is often drastically non-identical.

an organization might maintain an externally accessible influential-only DNS server to handle public DNS queries for the domains and zones that it handles. For its inner users, the organization might use an apart DNS server that contains the influential information that the public DNS provides, as well as extra information about inner hosts and services. It might also give extra features, such as recursion and caching for its inner cases.

While we mentioned the ability to have a solo server handle all of these tasks in the "combination" server above, there are certain benefits to splitting the workload. In information, maintaining completely apart servers (inner vs outer) that have no knowledge of each other is often desirable. It is especially all-important, from a security standpoint, that the public server has no records of the independent equivalent. This means not listing your independent name servers with NS records in the public zone records.

There are some additional considerations to keep in mind. While it might be easier to have your public and private servers share zone data that they have in common in a traditional leader-slave relationship, this can leak information about your private infrastructure into the wild.

Beyond just keeping your private servers out of the zone files themselves (essentially a publicly searchable entity), it is usually a good idea to also remove any reference to the private server in the public server's configuration files. This means removing transfer, notify, and leaders configuration details so that a compromise of the public server does not mean that your internal name servers are suddenly exposed.

This means maintaining apart zone records for each, which can be more work. However, this may be necessary for direct separation and security.


You are probably aware by this level that there is quite a bit of trait in selecting your DNS configuration.

Your decisions will largely be on your organization's needs and whether your important priority is to give faster DNS resolution for an action of cases (caching or forwarding) or to serve your domains and zones to the internet at gigantic (influential servers). Combination reaches are communal and, in the end, both spins of the resolution processes need to be were for.

In our next governs, we will show how to get began with some of these configurations. We will start by informing how to set up a caching or forwarding server. Later, we will cover how to serve your domains by setting up a set of authoritative-only DNS servers.

Reference: digitalocean