[dns-operations] does anybody know why yahoo+akamai are doing this?
Mark Andrews
Mark_Andrews at isc.org
Mon Mar 20 18:11:04 UTC 2006
>
> On Mar 20, 2006, at 9:23 AM, Mark Andrews wrote:
>
> >
> >>> Ah Akamai! I am much behind Paul on depth of understanding, albeit,
> >>> I will pro-offer the following, mostly clueless, attempt at an
> >>> explanation.
> >>
> >> I'm in the same boat r.e. depth of understanding, but doesn't that
> >> seem awfully redundant? The nameserver doing the lookup should go to
> >> the roots anyway, assuming it hasn't already cached referrals
> >> for .net or akamai.net.
> >>
> >> Matt
> >
> > This all falls out of RFC 1034. They are returning the
> > *best* referral they can on the second (or later) pass
> > through RFC1034 Section 4.3.2.
>
> Er, what? If this was a non-authoritative response, it would not be
> terribly unusual -- the resolver would just be returning the closest
> NS RRset that it had. However, the aa bit is set, so I am puzzled as
> to how it could not have a better NS set. Namely, the one for
> yahoo.com. Fingerprinting ns5.yahoo.com returns:
> fingerprint (ns5.yahoo.com, 216.109.116.17): BIND 8.3.0-RC1 -- 8.4.4
AA says that the *first* answer (CNAME) is authoritative. Any
other records in the answer section may not be authoritative.
> Also, the response isn't a referral. Was there ever any DNS software
> that would interpret it is as such?
>
> > To avoid this you would have to special case returning
> > referrals to the root. Special cases are bad.
> >
> > I also doubt that this is causing the spikes that Paul
> > mentioned originally unless the auth servers are BIND 8
> > behind a one way firewall which allows the queries to the
> > root out by not the replies in.
> >
> > Mark
>
> --
> David Blacka <davidb at verisignlabs.com>
> Sr. Engineer VeriSign Applied Research
>
>
>
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: Mark_Andrews at isc.org
More information about the dns-operations
mailing list