DNS域名解析投訴方面的處理案例-201102
幾個域名解析投訴處理過程鑒于dig 工具在DNS 解析過程的良好的能力,請大家使用dig 。1、 域名無法解析的投訴的處理過程:1) 在省網(wǎng)、集團(tuán)、google 的DNS 上進(jìn)行解析測試。--此步驟
幾個域名解析投訴處理過程
鑒于dig 工具在DNS 解析過程的良好的能力,請大家使用dig 。
1、 域名無法解析的投訴的處理過程:
1) 在省網(wǎng)、集團(tuán)、google 的DNS 上進(jìn)行解析測試。--此步驟是初步判斷是我省DNS 問
題還是共性問題。
省網(wǎng)DNS(211.140.13.188)
C:Documents and Settings?ministrator>dig @211.140.13.188 www.eglihtom.cn
; <<>>DiG 9.3.2 <<>> @211.140.13.188 www.eglihtom.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1865
---NXDOMAIN 即沒有該域名
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION: ----PC機(jī)發(fā)送的內(nèi)容
;www.eglihtom.cn. IN A
---------查詢www.eglihtom.cn 域名的A 記錄。所謂A 記錄即是IPV4下面域名對應(yīng)的IP 地址。如果是IPV6,則顯示為AAAA
;; AUTHORITY SECTION:---授權(quán)域應(yīng)答部分
cn. 1 IN SOA a.dns.cn. root.cnnic.cn. 2011492
305 7200 3600 2419200 21600
----以上為授權(quán)域的應(yīng)答,從這個應(yīng)答看,沒有eglihtom.cn 域,僅找到cn 域。 ;; Query time: 62 msec
;; SERVER: 211.140.13.188#53(211.140.13.188)
;; WHEN: Fri Feb 18 13:20:55 2011
;; MSG SIZE rcvd: 86
集團(tuán)DNS (211.136.17.107)
C:Documents and Settings?ministrator>dig @211.136.17.107 www.eglihtom.cn
; <<>>DiG 9.3.2 <<>> @211.136.17.107 www.eglihtom.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1683
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;;QUESTION SECTION:
;www.eglihtom.cn. IN A
;; AUTHORITY SECTION:
,cn. 2371 IN SOA a.dns.cn. root.cnnic.cn. 2011492
272 7200 3600 2419200 21600
;; Query time: 46 msec
;; SERVER: 211.136.17.107#53(211.136.17.107)
;; WHEN: Fri Feb 18 13:21:45 2011 ;; MSG SIZE rcvd: 86
GooleDNS (8.8.8.8)
C:Documents and Settings?ministrator>dig @8.8.8.8 www.eglihtom.cn
; <<>>DiG 9.3.2 <<>> @8.8.8.8 www.eglihtom.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1274
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;;QUESTION SECTION:
;www.eglihtom.cn. IN A
;;AUTHORITY SECTION:
cn. 1795 IN SOA a.dns.cn. root.cnnic.cn. 2011492
283 7200 3600 2419200 21600
;; Query time: 93 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Fri Feb 18 13:08:47 2011 ;; MSG SIZE rcvd: 86
從以上測試,可以看到www.eglihtom.cn 在三個域名服務(wù)器上解析,均得到域名不存在的應(yīng)答。從這里基本可以判斷該問題不是省網(wǎng)DNS 服務(wù)器的問題。
2) 在省網(wǎng)DNS 上進(jìn)行跟蹤測試。--此步驟為跟蹤域名解析的整體過程,了解問題存在
的環(huán)節(jié)。
C:Documents and Settings?ministrator>dig @211.140.13.188 www.eglihtom.cn tra ce
---跟蹤域名解析過程的命令,該命令送出后,會返回域名解析的整個過程。 ; <<>>DiG 9.3.2 <<>> @211.140.13.188 www.eglihtom.cn trace
; (1 server found)
;; global options: printcmd
. 3600000 IN NS D.ROOT-SERVERS.NET.
. 3600000 IN NS J.ROOT-SERVERS.NET.
. 3600000 IN NS E.ROOT-SERVERS.NET .
. 3600000 IN NS B.ROOT-SERVERS.NET .
,. 3600000 IN NS K.ROOT-SERVERS.NET.
. 3600000 IN NS H.ROOT-SERVERS.NET .
. 3600000 IN NS G.ROOT-SERVERS.NET .
. 3600000 IN NS A.ROOT-SERVERS.NET.
. 3600000 IN NS I.ROOT-SERVERS.NET .
. 3600000 IN NS F.ROOT-SERVERS.NET.
. 3600000 IN NS L.ROOT-SERVERS.NET .
. 3600000 IN NS M.ROOT-SERVERS.NET.
. 3600000 IN NS C.ROOT-SERVERS.NET . ;; Received 244 bytes from 211.140.13.188#53(211.140.13.188) in 15 ms
---以上返回為根服務(wù)器(即dot ),任何一個域名的查詢均從根開始。
cn. 172800 IN NS c.dns.cn.
cn. 172800 IN NS b.dns.cn.
cn. 172800 IN NS e.dns.cn.
cn. 172800 IN NS ns.cernet.net.
cn. 172800 IN NS a.dns.cn.
cn. 172800 IN NS d.dns.cn. ;; Received 296 bytes from 192.58.128.30#53(J.ROOT-SERVERS.NET) in 78 ms
--以上返回cn. 的NS 記錄
cn. 21600 IN SOA a.dns.cn. root.cnnic.cn. 2011492 332 7200 3600 2419200 21600
--以上為cn. 的SOA 參數(shù)。 ;; Received 86 bytes from 203.119.27.1#53(c.dns.cn) in 46 ms
---結(jié)束。大家可以查看一個任何正常的域名,如果www.eglihtom.cn 存在,則下一步必然然后eglihtom.cn 域,而此時沒有返回,基本可以斷定不存在該域名。
在跟蹤 www.eglihtom.cn 域名的解析過程中,在遞歸查詢中,有如下提示
;; Received 296 bytes from 198.41.0.4#53(a.root-servers.net) in 281 ms cn. 21600 IN SOA a.dns.cn. root.cnnic.cn. 2011492 286 7200 3600 2419200 21600
;; Received 86 bytes from 203.119.28.1#53(d.dns.cn) in 125 ms
從這個反饋的信息看,遞歸解析中僅找到cn. 而沒有找到eglihtom.cn. ,可以判斷該域不存在;
2),在隨便哪個域名注冊網(wǎng)頁(比如http://www.cndns.com/cn/domain/)對該域名進(jìn)行查詢,提示可以注冊,說明在當(dāng)前的注冊數(shù)據(jù)庫中,根本不存在www.eglihtom.cn 域名,故無法解析。---該步驟為核實。
2、 ksoa.tec.com.cn 域名無法解析處理說明。
1) 一般性情況確認(rèn)。
省網(wǎng)DNS 情況確認(rèn)
C:Documents and Settings?ministrator>dig @211.140.13.188 ksoa.tec.com.cn
; <<>>DiG 9.3.2 <<>> @211.140.13.188 ksoa.tec.com.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
,;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;ksoa.tec.com.cn. IN A
---查詢ksoa.tec.com.cn 的A 記錄 ;; AUTHORITY SECTION:
tec.com.cn. 1 IN SOA .hostmaster.nameserver. 44 2880
0 7200 604800 5
--返回找到tec.com.cn. 域
;; Query time: 250 msec
;; SERVER: 211.140.13.188#53(211.140.13.188)
;; WHEN: Fri Feb 18 13:39:16 2011
;; MSG SIZE rcvd: 89
集團(tuán)DNS 情況確認(rèn)
C:Documents and Settings?ministrator>dig @211.136.17.107 ksoa.tec.com.cn
; <<>>DiG 9.3.2 <<>> @211.136.17.107 ksoa.tec.com.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 494
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;ksoa.tec.com.cn. IN A
;; AUTHORITY SECTION:
tec.com.cn. 3600 IN SOA .hostmaster.nameserver. 44 2880
0 7200 604800 5
;; Query time: 187 msec
;; SERVER: 211.136.17.107#53(211.136.17.107)
;; WHEN: Fri Feb 18 13:41:54 2011
;; MSG SIZE rcvd: 89
Google DNS情況確認(rèn)
C:Documents and Settings?ministrator>dig @8.8.8.8 ksoa.tec.com.cn
; <<>>DiG 9.3.2 <<>> @8.8.8.8 ksoa.tec.com.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
,;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1182
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;ksoa.tec.com.cn. IN A
;; AUTHORITY SECTION:
tec.com.cn. 1800 IN SOA .hostmaster.nameserver. 44 2880
0 7200 604800 5
;; Query time: 218 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Fri Feb 18 13:42:39 2011
;; MSG SIZE rcvd: 89
2) 跟蹤解析過程 C:Documents and Settings?ministrator>dig @211.140.13.188 ksoa.tec.com.cn trace
; <<>>DiG 9.3.2 <<>> @211.140.13.188 ksoa.tec.com.cn trace
; (1 server found)
;; global options: printcmd
. 3600000 IN NS D.ROOT-SERVERS.NET. . 3600000 IN NS G.ROOT-SERVERS.NET . . 3600000 IN NS K.ROOT-SERVERS.NET. . 3600000 IN NS I.ROOT-SERVERS.NET . . 3600000 IN NS L.ROOT-SERVERS.NET . . 3600000 IN NS A.ROOT-SERVERS.NET. . 3600000 IN NS H.ROOT-SERVERS.NET . . 3600000 IN NS J.ROOT-SERVERS.NET. . 3600000 IN NS C.ROOT-SERVERS.NET . . 3600000 IN NS B.ROOT-SERVERS.NET . . 3600000 IN NS F.ROOT-SERVERS.NET. . 3600000 IN NS E.ROOT-SERVERS.NET . . 3600000 IN NS M.ROOT-SERVERS.NET. ;; Received 228 bytes from 211.140.13.188#53(211.140.13.188) in 31 ms
cn.172800 IN NS e.dns.cn.
cn. 172800 IN NS b.dns.cn.
cn. 172800 IN NS a.dns.cn.
cn. 172800 IN NS ns.cernet.net. cn. 172800 IN NS d.dns.cn.
cn. 172800 IN NS c.dns.cn.
,;; Received 296 bytes from 128.8.10.90#53(D.ROOT-SERVERS.NET) in 250 ms
tec.com.cn. 21600 IN NS ns1.dns-diy.com.
tec.com.cn. 21600 IN NS ns2.dns-diy.com.
--可以看到tec.com.cn. 的NS 記錄為ns1.dns-diy.com,ns2.dns-diy.com ,即tec.com.cn 域的授權(quán)DNS 為ns1.dns-diy.com 和ns2.dns-diy.com
;; Received 80 bytes from 203.119.29.1#53(e.dns.cn) in 46 ms
tec.com.cn. 3600 IN SOA .hostmaster.nameserver. 44 2880
0 7200 604800 5
;; Received 89 bytes from 218.85.139.33#53(ns1.dns-diy.com) in 93 ms
以上過程可以看到,我們省網(wǎng)DNS 已經(jīng)找到了tec.com.cn 的授權(quán)DNS ,但是授權(quán)DNS 返回NXDOMAIN 信息給我們。那么基本可以斷定是授權(quán)DNS 配置出問題。
3) 核實
C:Documents and Settings?ministrator>dig @211.140.13.188 ns1.dns-diy.cn
; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns1.dns-diy.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 642
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;ns1.dns-diy.cn. IN A
;; AUTHORITY SECTION:
dns-diy.cn. 1 IN SOA . hostmaster.nameserver. 5 28800
7200 604800 5
;; Query time: 140 msec
;; SERVER: 211.140.13.188#53(211.140.13.188)
;; WHEN: Fri Feb 18 13:48:18 2011
;; MSG SIZE rcvd: 88
C:Documents and Settings?ministrator>dig @211.140.13.188 ns2.dns-diy.cn
; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns2.dns-diy.cn
; (1 server found)
,;; global options: printcmd ;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1977
;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;ns2.dns-diy.cn. IN A
;; AUTHORITY SECTION:
dns-diy.cn. 1 IN SOA . hostmaster.nameserver. 5 28800
7200 604800 5
;; Query time: 125 msec
;; SERVER: 211.140.13.188#53(211.140.13.188)
;; WHEN: Fri Feb 18 13:48:29 2011
;; MSG SIZE rcvd: 88
---連授權(quán)域都找不到,比較暈。
跟蹤授權(quán)域域名的解析過程。
C:Documents and Settings?ministrator>dig @211.140.13.188 ns2.dns-diy.cn trace
; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns2.dns-diy.cn trace
; (1 server found)
;; global options: printcmd
. 3600000 IN NS D.ROOT-SERVERS.NET. . 3600000 IN NS G.ROOT-SERVERS.NET . . 3600000 IN NS K.ROOT-SERVERS.NET. . 3600000 IN NS I.ROOT-SERVERS.NET . . 3600000 IN NS L.ROOT-SERVERS.NET . . 3600000 IN NS A.ROOT-SERVERS.NET. . 3600000 IN NS H.ROOT-SERVERS.NET . . 3600000 IN NS J.ROOT-SERVERS.NET. . 3600000 IN NS C.ROOT-SERVERS.NET . . 3600000 IN NS B.ROOT-SERVERS.NET . . 3600000 IN NS F.ROOT-SERVERS.NET. . 3600000 IN NS E.ROOT-SERVERS.NET . . 3600000 IN NS M.ROOT-SERVERS.NET. ;; Received 228 bytes from 211.140.13.188#53(211.140.13.188) in 31 ms
cn. 172800 IN NS d.dns.cn.
cn. 172800 IN NS a.dns.cn.
cn. 172800 IN NS c.dns.cn.
,cn. 172800 IN NS b.dns.cn.
cn. 172800 IN NS ns.cernet.net. cn. 172800 IN NS e.dns.cn.
;; Received 295 bytes from 128.8.10.90#53(D.ROOT-SERVERS.NET) in 265 ms
dns-diy.cn. 21600 IN NS ns2.dns-diy.com. dns-diy.cn. 21600 IN NS ns1.dns-diy.com. ;; Received 79 bytes from 203.119.25.1#53(a.dns.cn) in 140 ms
dns-diy.cn. 3600 IN SOA . hostmaster.nameserver. 5 28800
7200 604800 5
;; Received 88 bytes from 218.107.207.23#53(ns2.dns-diy.com) in 78 ms
---解析ns1.dns-diy.com
C:Documents and Settings?ministrator>dig @211.140.13.188 ns2.dns-diy.com
; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns2.dns-diy.com
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 592
;; flags: qrrdra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;ns2.dns-diy.com. IN A
;; ANSWER SECTION:
ns2.dns-diy.com. 600 IN A 218.107.207.23 ns2.dns-diy.com. 600 IN A 218.5.74.111
--幸好,終于有能解析出IP 的域名了。
;; Query time: 31 msec
;; SERVER: 211.140.13.188#53(211.140.13.188)
;; WHEN: Fri Feb 18 13:50:21 2011
;; MSG SIZE rcvd: 65
---在ns2.dns-diy.cn 的授權(quán)域上解析該域
C:Documents and Settings?ministrator>dig @218.107.207.23 ns2.dns-diy.cn ---這個IP 就是上一步解析得到的IP
; <<>>DiG 9.3.2 <<>> @218.107.207.23 ns2.dns-diy.cn
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 112
;; flags: qraard; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
,---好吧,現(xiàn)在可以確定是授權(quán)域直接給出NXDOMAIN 的問題,那么可以確定是授權(quán)域配置問題了。
;; QUESTION SECTION:
;ns2.dns-diy.cn. IN A
;; AUTHORITY SECTION:
dns-diy.cn. 3600 IN SOA . hostmaster.nameserver. 5 28800
7200 604800 5
;; Query time: 109 msec
;; SERVER: 218.107.207.23#53(218.107.207.23)
;; WHEN: Fri Feb 18 13:50:49 2011
;; MSG SIZE rcvd: 88