
A importância do hardening em sistemas operacionais: por onde começar?
7 de junho de 2021
By Sam Preston May 27, 2021 9:00 AM
This article has been updated to include recent industry trends and information about primary implementations.
Akamai Edge DNS service delivers edge-based, authoritative domain services for thousands of organizations. These organizations trust Edge DNS to deliver reliable and performant responses, reflected by a 100% uptime service-level agreement. Along with unmatched reliability, Edge DNS boasts an impressive geographically diverse footprint and an intelligently deployed anycast network, ensuring client queries are consistently routed to a nearby nameserver in an efficient manner. From an operations perspective, Akamai offers administrators the flexibility to leverage Edge DNS as either a secondary or primary provider, as well as the option of implementing DNSSEC to protect against DNS forgery and manipulation.
This model allows domain owners to continue to rely on their existing provider for record management, while leveraging the Edge DNS network to reliably respond to end-user queries. For a heightened security posture, domain owners can mask their primary nameservers by exclusively delegating zones to Edge DNS. Transactional signatures (TSIGs) can also be implemented to authenticate zone transfers.
Secondary onboarding: updating nameserver and delegation records
One conundrum DNS administrators encounter is how to properly update their record sets when they’re ready to onboard a zone to Edge DNS in a secondary model. Specifically, the order of operations for updating the zone’s NS records and the domain registrar’s delegation records can be a source of precarious uncertainty during the transition since the primary and secondary zones will advertise identical NS records via axfr calls. Although there are a number of valid implementation strategies involving these two steps, a few core principles should be incorporated into the deployment plan.
Zone File | Registrar |
![]() ns1.example.com |
ns1.example.com ns2.example.com |
Zone File | Registrar |
![]() ns1.example.com |
ns1.example.com ns2.example.com ns3.example.com |
During the interim period when the Akamai nameservers are only listed in the zone file, certain resolvers will cache the zone’s NS records even if another record type is being retrieved. As a result, a percentage of DNS queries will “leak” to Edge DNS even before the delegation step is performed:
Zone File | Registrar |
ns1.example.com ns2.example.com a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net In this scenario, a certain |
ns1.example.com ns2.example.com |
Consequently, zone transfers need to be successfully established before adding the Akamai nameservers to the zone file. The amount of traffic sent to Akamai will be determined by the length of the NS records’ time to live (TTL). The greater the TTL, the more traffic will be directed to Edge DNS. Similarly, domain owners should NOT deprovision any legacy nameservers until they’re removed from both record sets and the pertinent TTLs have expired.
With these key principles in mind, the implementation steps will follow this high-level order of operations:
Zone File | Registrar |
ns1.example.com ns2.example.com a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net To reiterate: Some DNS |
ns1.example.com ns2.example.com |
2a. Update registrar to add the same Akamai nameservers referenced in step 1a.
Zone File | Registrar |
ns1.example.com ns2.example.com a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net |
ns1.example.com ns2.example.com a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net |
2b. Remove legacy nameservers from registrar’s NS records (if necessary if necessary / a mixed delegation model is also supported).
Zone File | Registrar |
ns1.example.com ns2.example.com a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net Some DNS traffic will be |
a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net |
Zone File | Registrar |
a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net |
a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net |
There are a number of different iterations, but the overall execution will follow this basic template. In addition, it’s always best practice to reduce the TTLs for the zone file’s authoritative NS records during the implementation in case a rollback is needed.
While the above principles also hold true for a primary implementation, the Edge DNS zone records can be edited independently in a primary model, which alleviates the underlying order of operations concern. Each provider simply needs to list themselves as authoritative in the zone’s NS records during the transition period.
Edge DNS Zone File | Legacy Zone File |
a12-65.akam.net a13-65.akam.net a2-64.akam.net a3-64.akam.net a4-65.akam.net |
ns1.example.com ns2.example.com |
Just like with a secondary implementation, the delegation records should ultimately match the NS records of the zone once the onboarding process is complete; therefore, all providers’ zones in a mixed delegation model should advertise the same NS records in the eventual steady state. And, as with any implementation, Akamai’s professional services team should be consulted to assist with any additional nuances involved with your Edge DNS implementation.
Everything Akamai deploys depends on our intelligent edge DNS platform, which expands to enable a range of services for domain owners. If you find this blog useful, continue your exploration with these references.
Questions about DNS? Contact us to receive help from Akamai Technical Support.
Copyright 2021by Akamai Technologies, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form by any means without the written permission of Akamai Technologies, Inc. While every precaution has been taken in the preparation of this document, Akamai Technologies, Inc. assumes no responsibility for errors, omissions, or for damages resulting from the use of the information herein. The information in these documents is subject to change without notice.