Showing posts with label DNS. Show all posts
Showing posts with label DNS. Show all posts

Wednesday, February 1, 2012

Some external DNS servers

Google

8.8.8.8
8.8.4.4

Level 3 Communications (Broomfield, CO, U.S.)

4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
4.2.2.6

Verizon (Reston, VA, U.S.)

151.197.0.38
151.197.0.39
151.202.0.84
151.202.0.85
151.202.0.85
151.203.0.84
151.203.0.85
199.45.32.37
199.45.32.38
199.45.32.40
199.45.32.43

GTE (Irving, TX, U.S.)

192.76.85.133
206.124.64.1

One Connect IP (Albuquerque, NM, U.S.)

67.138.54.100

OpenDNS (San Francisco, CA, U.S.)

208.67.222.222
208.67.220.220

Exetel (Sydney, AU)

220.233.167.31

VRX Network Services (New York, NY, U.S.)

199.166.31.3

SpeakEasy (Seattle, WA, U.S.)

66.93.87.2
216.231.41.2
216.254.95.2
64.81.45.2
64.81.111.2
64.81.127.2
64.81.79.2
64.81.159.2
66.92.64.2
66.92.224.2
66.92.159.2
64.81.79.2
64.81.159.2
64.81.127.2
64.81.45.2
216.27.175.2
66.92.159.2
66.93.87.2

SprintLink (Overland Park, KS, U.S.)

199.2.252.10
204.97.212.10
204.117.214.10

Cisco (San Jose, CA, U.S.)

64.102.255.44
128107241185

OpenNIC

202.83.95.227 (au)
119.31.230.42 (u)
178.63.26.173 (of)
217.79.186.148 (of)
27.110.120.30 (nz)
89.16.173.11 (uk)
69.164.208.50 (us)
216.87.84.211 (us)
2001:470:8388:10:0:100:53:20 (us)
2001:470:1 f10: c6: 2 (us)

Resolve NetBIOS names to VPN

After questioning several times regarding this topic of NetBIOS name resolution when connected to a VPN Server and ISA or TMG, I decided to stop being bum and post the settings needed to solve this problema.Na fact, it is a simple single configuration!

The nature of the problem is as follows:

When connected to the VPN, you can just drop the equipment on the internal network via the IP address and the FQDN of the machine (eg server.domain.local) is not possible to resolve NetBIOS names of the form (eg server). For this to happen, we must make the following configuration on the VPN client connection:

In the Connection Properties, click the tab and then the NETWORKING PROPERTIES TCP/IPv4 protocol. ... Click on the ADVANCED tab and DNS. Check the option DNS suffix for this connection, the DNS domain suffix, as in the image below!

Capture

Friday, July 23, 2010

Wizard ´ s for creating records policy framework (SPF)

 

The SPF record is used as a form of control and authenticity of servers that are responsible for sending emails in a domain, so the SpamCheck ´ s …

To assist in creating these records in DNS, follows below two WIZARD ´ s:

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wizard/

http://old.openspf.org/wizard.html

I hope it's useful!

Sunday, June 27, 2010

RPC integrity checking for DNS requests in Windows Server 2008 R2

 

Staff, a new security feature of Windows Server 2008 R2 must take our attention, which is the RPC integrity checking for DNS requests. This feature is not supported on Windows 2000 DNS and Windows Server 2003.

Because of this verification, in a mixed environment and migration where we will have the coexistence of servers and workstations running legacy systems, it may be necessary for disable this feature because it can cause failure in the external name resolution in DNS clients running Windows Server 2003, 2000 and XP do not have problems on clients running Windows 7.

Unfortunately discovered feature in the worst way (during a migration process, experiencing the symptoms mentioned above) and not by study … so I'm posting it because it is a resource which we have a few references and believe to be useful! below is the command to disable the security feature:

Dnscmd.exe /Config /RpcAuthLevel 0

…. to activate the feature, just change-mos value from 0 to 1 … as shown.

Dnscmd.exe /Config /RpcAuthLevel 1

For us to verify the current status of the configuration, we can use the parameter /info:

Dnscmd.exe /info /RpcAuthLevel

I hope it's useful!

Tuesday, March 23, 2010

Level 300:-DNS – Flow of DNS name resolution for Microsoft clients

 

In this article we will tackle the flow of DNS name resolution from equipment running Windows 2000 and later is very important to know-mos this flow, primarily involves troubleshooting.

In pre-Windows 2000 clients, we primarily NetBIOS name resolution that does not necessarily need to be used in Windows 2000 and later systems, which use DNS name resolution as a primary method.

DNS names are divided into two parts as shown below:

WWW. Z1BR.com

ZAMBONIS.Spaces.live.com

COMPUTER01.LOCAL WOODGROVEBANK.

This structure consists of host name (in yellow) and DNS suffix (in red).The host name is associated with a record in DNS that points to an IP address and the DNS suffix associated DNS zone where registry.

Now that we are reminded of how the structure of DNS names, let's look at how the flow of name resolution.

Let's take as an example of a user who wants to access a network share; the user enters \\ServerFS01\SharedFolder

The first step is to complete the requested host name with the DNS suffix of agreement as specified in the network connection properties, clicking on properties of TCP-IP (in both IPv4 and IPv6) version click on the button "Advanced" and the DNS tab as shown in the image:

image

Is selected by default, the option "Append parent suffixes of the primary DNS Suffix", this option will add the suffix father of MACHINE names requested which was not specified the FQDN, as in our example. Note that below this option we choose in choose a suffix list; in the case of having multiple domains for example (the suffixes are added to the list, in order, until you found the host), with this procedure we can expedite workstation, in a large forest. Another option we configure statically would add a DNS suffix for the connection (this setting will not be changed automatically).

With regard to the primary suffix of the machine, we can find it in the "Advanced properties of the system" in the "computer name" tab, as shown in the picture on below (note that the suffix is by default changed automatically when the machine is joined to a new domain);  for security reasons, some organizations desmarcam this checkbox, which can cause name resolution problems if the analyst update manually the primary suffix.

image

After completing the host name with the DNS suffix, the next system procedure is to check the machine's DNS CACHE function local DNS cache is to expedite the process of resolving names in addition to decrease network traffic; we can see this cache through ipconfig/displaydns command and erases it via ipconfig/flushdns command.

You can disable logging cache through the command net stop DNSCACHE or disabling the DNS Client service by service console (services.msc).

In the local DNS CACHE can be stored records positive responses resolved successfully by the DNS server) and negative records (answers resolved by the DNS server on which the DNS client cannot connect to the host, such as the status of "host not found" when we access a URL. by default, the storage time for a record in the DNS cache is 86,400 seconds (1 day) and a negative record of 900 seconds (15 minutes). However we modify this period by editing the registry:

  • To define the period of storage of positive and negative records, overwhelmed by the following key:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNSCache\Parameters

    • For editing storage records POSITIVE we must create a new DWORD value with the name MaxCacheTtl (this value must be established in seconds; the default value is 86400).
    • For editing storage records NEGATIVE we must create a new DWORD value with the name MaxNegativeCacheTtl (this value must be established in seconds; the default value is 900).

If the requested name is not resolved by the DNS cache, the next step would be to consult the hosts file located in the directory%windir%\System32\drivers\etc\. The hosts file contains static entries and is typically used to expedite the process of resolving names, pre-population of DNS cache, for environments in "workgroup" as in a DMZ or still to block sites. We use cautiously the hosts file, because it is a way to decentralise the resolution of names; what can cause problems for a resolution, if there are changes in settings of TCP-IP hosts mapped. Below is the video where I show an example of editing the hosts file:

The next step is to forward the request to the preferred DNS server configured on the properties of TCP-IP of the network interface. If the preferred DNS server is offline, or for any reason the DNS client does not have server connectivity, name resolution request is forwarded to the secondary DNS server, if the same is also without communication with the client, the request is forwarded to another DNS server that is listed at the top of the list of DNS servers in the DNS tab of the advanced settings of TCP-IP. The list is checked from top to bottom, what makes recommended placing at the top of the list, the same site and servers, or servers of sites where the link to connect to the DNS client has the highest bandwidth available.

image

When the request arrives at the DNS server, the server performs the following procedures to try to resolve the host:

1-server's cache (this is not the same DNS cache commented previously, and yes the cache of DNS service);

2 – DNS zones (… search server hosting areas …)

3 – search in the WINS database (if configured …with this feature server searches the database of the WINS servers listed to verify the existence of the requested record.)

4 – conditional forwarders (requisitions routing rules for a given domain DNS)

5 – Forwarders (… forwarding for any request that the server does not resolve)

6 – Root Hints (… servers responsible for the root domain (".") on the Internet)

Note: these DNS server resources will be covered in detail in the next articles in the series