Contents

Domain Name System

DNS (Domain Name System), is a hierarchical and distributed naming system used to convert human-readable domain names into machine-readable IP addresses. We can use dig www.ykaros.site +trace to show a detailed step-by-step view of how the DNS resolution process unfolds, starting from root DNS servers down to the authoritative DNS servers.

Root DNS Server

The first part shows details for root DNS servers where they start with a dot (.) represent the root DNS servers and there are 13 of them, from a.root-servers.net. to m.root-servers.net. The last line is an RRSIG (Resource Record Signature) record, used for providing cryptographic signatures for the associated NS records. Let’s dig into it:

  • 8: The algorithm used to sign (RSA/SHA-256)
  • 0: Number of labels of the RRSET
  • 518400: The TTL (Time to Live) of the RRSIG record (in seconds)
  • 20240116170000: The expiration date
  • 20240103160000: The inception date
  • 30903: The key tag
  • .: Signer’s name
  • b1uPMq5/1: The Signature
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
; <<>> DiG 9.10.6 <<>> www.ykaros.site +trace
;; global options: +cmd
.			342267	IN	NS	c.root-servers.net.
.			342267	IN	NS	h.root-servers.net.
.			342267	IN	NS	a.root-servers.net.
.			342267	IN	NS	l.root-servers.net.
.			342267	IN	NS	e.root-servers.net.
.			342267	IN	NS	b.root-servers.net.
.			342267	IN	NS	i.root-servers.net.
.			342267	IN	NS	f.root-servers.net.
.			342267	IN	NS	d.root-servers.net.
.			342267	IN	NS	g.root-servers.net.
.			342267	IN	NS	k.root-servers.net.
.			342267	IN	NS	j.root-servers.net.
.			342267	IN	NS	m.root-servers.net.
.			428658	IN	RRSIG	NS 8 0 518400 20240116170000 20240103160000 30903 . b1uPMq5/173mbq1JX9U2W38gSTzWkpiDVsA3sMPBKZIXhr61h89W3c96 oyd+REdRsdVKV2X14bpXDhYCrteHHv8gmXRM+8GjKepPORvUzVo82jP4 xT5dQZTSFVbkFb7qH7gZLgDPiQxrwcBqySQlAc2xhcEOVEIXWf5Pek89 96palcC0d4Avx3wO/M883dxFKpW+Y5Z9aNoJDlFoS4FhNaQqHBuhRvxz c/TeyiL9O2oWDqCCe4qVKB/e2BQhi21DMgt5Cx6Q2CS/jIcr4NgOBk3c X8UJ6GfTAc8Zuw9tupQSMssx4ZiIEnqouyhy5RqCXNG7bpy/Shsm6tZ2 xBtHzA==

Top Level Domain (TLD) DNS Server

Then the root servers send queries to TLD servers to query site..

1
2
3
4
5
6
7
8
9
;; Received 1109 bytes from 10.173.91.33#53(10.173.91.33) in 55 ms

site.			172800	IN	NS	a.nic.site.
site.			172800	IN	NS	b.nic.site.
site.			172800	IN	NS	e.nic.site.
site.			172800	IN	NS	f.nic.site.
site.			86400	IN	DS	51676 8 1 90DDBEEEB973B0F8719ED763FB6EEDE97C73ABF5
site.			86400	IN	DS	51676 8 2 883175F6F5C68EA81563B62D1B2B79B6A997D60DC6E20CC70AFD0CD6 B7E82F62
site.			86400	IN	RRSIG	DS 8 1 86400 20240117170000 20240104160000 30903 . mmwjDLH4smT/Luwcxp73hnrDYvKVvKBhTUq85PEpJvYLJjJ+8iROo/hR Und3191XZOvf2HMP3UHH5s+9nigGJ6WnYS1rXn2qFGJtiVTScO9+tVPf 8WxXVB8wpmniioDDdN6WwHaC+PrGbQd/RX+ZlSeIXI+rmPt1o67zhttY /J+toj6rZiCRZEPl0yoL0FeeVOS7s2KIojFL0se99gEks13D/urnSuFz mCMtVCrnpoGpfUV498EUqMCXQexCNOvnZdy+rE2r8CqmwsDYY+SSDnTl PJUXVIcLHQ+ZRmebY9H8tZVkXV0dwXOt7C8UcKRRZJu4jrBs0rSwNVjd 4M47pw==

Authoritative Name Server

Once the resolver obtains the authoritative name servers for the top-level domain (TLD), it will continue the trace by querying the authoritative servers for each subsequent level of the domain until it reaches the authoritative name servers for the specified subdomain. Finally, it states that the domain “www.ykaros.site” is a Canonical Name (CNAME) record pointing to “ykaros.github.io.”.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
;; Received 659 bytes from 198.97.190.53#53(h.root-servers.net) in 30 ms

ykaros.site.		3600	IN	NS	dns1.registrar-servers.com.
ykaros.site.		3600	IN	NS	dns2.registrar-servers.com.
.
.
.
;; Received 590 bytes from 185.24.64.61#53(b.nic.site) in 17 ms

www.ykaros.site.	1799	IN	CNAME	ykaros.github.io.
;; Received 74 bytes from 156.154.132.200#53(dns1.registrar-servers.com) in 13 ms