<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DNS Archives - OVHcloud Blog</title>
	<atom:link href="https://blog.ovhcloud.com/tag/dns/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.ovhcloud.com/tag/dns/</link>
	<description>Innovation for Freedom</description>
	<lastBuildDate>Tue, 21 Apr 2026 09:52:19 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.ovhcloud.com/wp-content/uploads/2019/07/cropped-cropped-nouveau-logo-ovh-rebranding-32x32.gif</url>
	<title>DNS Archives - OVHcloud Blog</title>
	<link>https://blog.ovhcloud.com/tag/dns/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DNS records: understanding their role and SVCB/HTTPS developments</title>
		<link>https://blog.ovhcloud.com/dns-records-understanding-role-svcb-https-developments/</link>
		
		<dc:creator><![CDATA[Bérénice Despres&nbsp;and&nbsp;Christophe Brunet]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 08:22:44 +0000</pubDate>
				<category><![CDATA[OVHcloud Education]]></category>
		<category><![CDATA[OVHcloud Product News]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Domain names]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=31344</guid>

					<description><![CDATA[You never see it, but without the DNS, no website would be accessible, no email could be delivered, and no online service would work correctly. At the heart of this system are DNS records, which structure how services are exposed on the Internet. These records evolve alongside modern web architectures, and at OVHcloud, this has [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fdns-records-understanding-role-svcb-https-developments%2F&amp;action_name=DNS%20records%3A%20understanding%20their%20role%20and%20SVCB%2FHTTPS%20developments&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="572" src="https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-1024x572.png" alt="" class="wp-image-31332" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-1024x572.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-300x167.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-768x429.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue.png 1376w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>You never see it, but without the DNS, no website would be accessible, no email could be delivered, and no online service would work correctly.</p>



<p>At the heart of this system are DNS records, which structure how services are exposed on the Internet. These records evolve alongside modern web architectures, and at OVHcloud, this has resulted in support for SVCB and HTTPS records.</p>



<p>To better understand these innovations, let’s look at the main types of DNS records and their roles.</p>



<h2 class="wp-block-heading"><strong>The DNS in a few words</strong><strong></strong></h2>



<p>The Domain Name System (DNS) translates a domain name into an IP address that is understandable by machines. When a user enters a web address (such as “www.example.com”), a request is sent to identify the corresponding server.</p>



<p>This phase, known as DNS resolution, uses different types of records that each fulfil a specific role.</p>



<h2 class="wp-block-heading"><strong>The most common DNS records</strong><strong></strong></h2>



<p>Some records are essential when configuring a domain. Here are the main types present in a DNS zone.</p>



<h4 class="wp-block-heading"><strong>A and AAAA: make a website accessible</strong></h4>



<p>For a website to be reachable, its domain name must be associated with an IP address. This is where A (IPv4) and AAAA (IPv6) records come in.</p>



<p>They form the basis of DNS resolution and allow browsers to reach the server hosting the site.</p>



<h4 class="wp-block-heading"><strong>CNAME: creates an alias between two domain names</strong></h4>



<p>A CNAME record allows one domain name to point to another, without directly associating it with an IP address. For example, “blog.example.com” can link to “example.com”, which avoids duplicating the configuration.</p>



<p>⚠️ Note: a CNAME cannot be configured at the root of a domain (e.g. “example.com”). It is only used on subdomains, such as “blog.example.com”.</p>



<h4 class="wp-block-heading"><strong>MX: manages the receipt of emails</strong></h4>



<p>MX (Mail Exchange) records indicate which servers should handle emails being sent to a domain. They play a central role in distributing messages and in the reliability of messaging.</p>



<h4 class="wp-block-heading"><strong>TXT: verifies a domain and enhances security</strong></h4>



<p>TXT records allow additional information to be linked to a domain. They are particularly used to prove ownership to external services and to secure emails.</p>



<p>Mechanisms such as SPF, DKIM, or DMARC rely on TXT records to limit identity theft and spam.</p>



<h2 class="wp-block-heading"><strong>SVCB and HTTPS: what are these new DNS records for?</strong><strong></strong></h2>



<p>During DNS resolution, the browser obtains the information needed to contact a server.</p>



<p>SVCB (Service Binding) and HTTPS records enrich this step by indicating more precisely how to access the service.</p>



<p>They may mention the supported protocols (HTTP/2 or HTTP/3), the preferred server, or certain technical parameters intended to optimise the connection.</p>



<p>By transmitting this information during the resolution, they limit certain intermediate exchanges between the browser and the server. This mechanism helps to improve the performance and loading speed of websites.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2026/04/dns-svcb-https-illustration.svg" alt="" class="wp-image-31333"/></figure>



<h2 class="wp-block-heading"><strong>A key use case: the alias at the root of the domain</strong><strong></strong></h2>



<p>As mentioned, a CNAME record cannot be configured at the root of a domain (such as “example.com”). This constraint of the DNS required the use of alternative solutions when it was necessary to point a main domain to an external service.</p>



<p>HTTPS and SVCB records remove this limitation. They offer the option to indicate that a web service located at the root of the domain is provided by another name, similar to a CNAME, while adhering to DNS rules.</p>



<p>Here’s an example: a company broadcasts its site via a CDN accessible at the address “example.cdn-provider.net”, while retaining “example.com” as the access point. Thanks to a HTTPS record, the browser can be directed to the CDN service without a visible redirection for the user or a complex DNS configuration.</p>



<p>⚠️ However, these mechanisms rely on newer features, so their support may vary depending on the browsers and operating systems, particularly in older environments.</p>



<h2 class="wp-block-heading"><strong>What benefits do these new records offer?</strong><strong></strong></h2>



<p>By enriching the DNS resolution phase, SVCB and HTTPS records can direct clients more accurately towards suitable services.</p>



<p>This helps to reduce latency, improve perceived performance, and strengthen consistency across browsers, protocols, and infrastructures.</p>



<p>These records also provide greater flexibility in DNS configuration, particularly for environments integrating CDNs, external platforms, or distributed cloud architectures.</p>



<h2 class="wp-block-heading"><strong>How can I configure my SVCB and HTTPS records with OVHcloud?</strong><strong></strong></h2>



<p>SVCB and HTTPS records are available from your&nbsp;<a href="https://auth.eu.ovhcloud.com/signin/?onsuccess=https%3A//manager.eu.ovhcloud.com&amp;ovhSubsidiary=EN" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud control panel</a>.</p>



<p>To configure them:</p>



<ol class="wp-block-list">
<li>Go to the “Domain Names” section</li>



<li>Select the relevant domain</li>



<li>Access the “DNS Zone” tab</li>



<li>Add a new SVCB or HTTPS record</li>
</ol>



<p>Depending on your situation, you may need to adjust the associated settings (priority, target, service-specific options). For detailed information on managing DNS records, please consult our&nbsp;<a href="https://help.ovhcloud.com/csm/en-gb-dns-zone-records?id=kb_article_view&amp;sysparm_article=KB0063627" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">dedicated guide</a>.</p>



<h2 class="wp-block-heading"><strong>In summary: a more flexible and effective DNS</strong><strong></strong></h2>



<p>The DNS remains an essential pillar of the internet and continues to evolve to adapt to newer architectures.</p>



<p>With SVCB and HTTPS records, it is now possible to optimise service exposure, simplify certain configurations (particularly at the root of the domain), and improve performance from the resolution stage.This is a discreet yet strategic technical development in response to the growing demands for speed, security, and flexibility.</p>
<img decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fdns-records-understanding-role-svcb-https-developments%2F&amp;action_name=DNS%20records%3A%20understanding%20their%20role%20and%20SVCB%2FHTTPS%20developments&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enregistrements DNS : comprendre leur rôle et les évolutions SVCB/HTTPS</title>
		<link>https://blog.ovhcloud.com/enregistrements-dns-comprendre-role-evolutions-svcb-https/</link>
		
		<dc:creator><![CDATA[Bérénice Despres&nbsp;and&nbsp;Christophe Brunet]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 08:22:05 +0000</pubDate>
				<category><![CDATA[OVHcloud en Français]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Domain names]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=31327</guid>

					<description><![CDATA[On ne le voit jamais. Pourtant, sans le DNS, aucun site web ne serait accessible, aucun e-mail ne pourrait être distribué, aucun service en ligne ne fonctionnerait correctement. Au cœur de ce système se trouvent les enregistrements DNS, qui structurent la manière dont les services sont exposés sur Internet. Ils évoluent avec les architectures web [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fenregistrements-dns-comprendre-role-evolutions-svcb-https%2F&amp;action_name=Enregistrements%20DNS%C2%A0%3A%20comprendre%20leur%20r%C3%B4le%20et%20les%20%C3%A9volutions%20SVCB%2FHTTPS&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="572" src="https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-1024x572.png" alt="" class="wp-image-31332" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-1024x572.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-300x167.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue-768x429.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/04/Enregistrements-DNS-main-image-blue.png 1376w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>On ne le voit jamais. Pourtant, sans le DNS, aucun site web ne serait accessible, aucun e-mail ne pourrait être distribué, aucun service en ligne ne fonctionnerait correctement.</p>



<p>Au cœur de ce système se trouvent les enregistrements DNS, qui structurent la manière dont les services sont exposés sur Internet. Ils évoluent avec les architectures web modernes. Chez OVHcloud, cela se traduit notamment par la prise en charge des enregistrements SVCB et HTTPS.</p>



<p>Pour mieux comprendre ces nouveautés, revenons sur les principaux enregistrements DNS et leur rôle.</p>



<h2 class="wp-block-heading"><strong>Le DNS en quelques mots</strong><strong></strong></h2>



<p>Le Domain Name System (DNS) traduit un nom de domaine en adresse IP compréhensible par les machines. Lorsqu’un internaute saisit une adresse web (telle que «&nbsp;www.exemple.com&nbsp;»), une requête est ainsi envoyée pour identifier le serveur correspondant.</p>



<p>Cette phase, appelée résolution DNS, s’appuie sur différents types d’enregistrements, chacun remplissant un rôle précis.</p>



<h2 class="wp-block-heading"><strong>Les enregistrements DNS les plus courants</strong><strong></strong></h2>



<p>Certains enregistrements sont incontournables dans la configuration d’un domaine. Voici les principaux types présents dans une zone DNS.</p>



<h4 class="wp-block-heading"><strong>A et AAAA&nbsp;: rendre un site accessible</strong></h4>



<p>Pour qu’un site soit joignable, son nom de domaine doit être associé à une adresse IP. C’est le rôle des enregistrements A (IPv4) et AAAA (IPv6).</p>



<p>Ils constituent la base de la résolution DNS et permettent aux navigateurs d’atteindre le serveur qui héberge le site.</p>



<h4 class="wp-block-heading"><strong>CNAME&nbsp;: créer un alias entre deux noms de domaine</strong></h4>



<p>Un enregistrement CNAME permet de faire pointer un nom de domaine vers un autre, sans l’associer directement à une adresse IP. Par exemple, «&nbsp;blog.exemple.com&nbsp;» peut renvoyer vers «&nbsp;exemple.com&nbsp;», ce qui évite de dupliquer la configuration.</p>



<p>⚠️&nbsp;À noter&nbsp;: un CNAME ne peut pas être configuré à la racine d’un domaine («&nbsp;exemple.com&nbsp;»). Il ne s’utilise que sur des sous-domaines, comme «&nbsp;blog.exemple.com&nbsp;».</p>



<h4 class="wp-block-heading"><strong>MX&nbsp;: gérer la réception des e-mails</strong></h4>



<p>Les enregistrements&nbsp;MX (Mail Exchange) indiquent quels serveurs doivent traiter les e-mails destinés à un domaine. Ils jouent un rôle central dans la distribution des messages et dans la fiabilité de la messagerie.</p>



<h4 class="wp-block-heading"><strong>TXT&nbsp;: vérifier un domaine et renforcer la sécurité</strong></h4>



<p>Les enregistrements TXT permettent d’associer des informations supplémentaires à un domaine. Ils sont notamment utilisés pour prouver sa propriété auprès de services externes et pour sécuriser les e-mails.</p>



<p>Des mécanismes comme SPF, DKIM ou DMARC reposent sur des enregistrements TXT afin de limiter l’usurpation d’identité et le spam.</p>



<h2 class="wp-block-heading"><strong>SVCB et HTTPS&nbsp;: à quoi servent ces nouveaux enregistrements DNS&nbsp;?</strong><strong></strong></h2>



<p>Lors de la résolution DNS, le navigateur obtient les informations nécessaires pour contacter un serveur.</p>



<p>Les enregistrements SVCB (Service Binding) et HTTPS enrichissent cette étape en indiquant plus précisément comment accéder au service.</p>



<p>Ils peuvent notamment mentionner les protocoles pris en charge (HTTP/2 ou HTTP/3), le serveur à privilégier ou encore certains paramètres techniques destinés à optimiser la connexion.</p>



<p>En transmettant ces informations dès la résolution, ils limitent certains échanges intermédiaires entre le navigateur et le serveur. Ce mécanisme contribue à améliorer la performance et la rapidité de chargement des sites web.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://blog.ovhcloud.com/wp-content/uploads/2026/04/dns-svcb-https-illustration.svg" alt="" class="wp-image-31333"/></figure>



<h2 class="wp-block-heading"><strong>Un cas d’usage clé&nbsp;: l’alias à la racine du domaine</strong><strong></strong></h2>



<p>Comme vu précédemment, un enregistrement CNAME ne peut pas être configuré à la racine d’un domaine (comme «&nbsp;exemple.com&nbsp;»). Cette contrainte historique du DNS obligeait à utiliser des solutions alternatives lorsqu’il fallait faire pointer un domaine principal vers un service externe.</p>



<p>Les enregistrements HTTPS et SVCB permettent de lever cette limitation. Ils offrent la possibilité d’indiquer qu’un service web situé à la racine du domaine est fourni par un autre nom, de manière similaire à un CNAME, tout en respectant les règles du DNS.</p>



<p>Prenons un exemple&nbsp;: une entreprise diffuse son site via un CDN accessible à l’adresse «&nbsp;exemple.cdn-provider.net&nbsp;», en conservant «&nbsp;exemple.com&nbsp;» comme point d’accès. Grâce à un enregistrement HTTPS, le navigateur peut être orienté vers le service du CDN sans redirection visible pour l’internaute ni configuration DNS complexe.</p>



<p>⚠️&nbsp;Ces mécanismes reposent toutefois sur des fonctionnalités récentes. Leur prise en charge peut donc varier selon les navigateurs et les systèmes d’exploitation, en particulier dans des environnements plus anciens.</p>



<h2 class="wp-block-heading"><strong>Quels bénéfices pour ces nouveaux enregistrements&nbsp;?</strong><strong></strong></h2>



<p>En enrichissant la phase de résolution DNS, les enregistrements SVCB et HTTPS permettent une orientation plus précise des clients vers les services adaptés.</p>



<p>Ils contribuent ainsi à réduire la latence, à améliorer la performance perçue, ainsi qu’à renforcer la cohérence entre navigateurs, protocoles et infrastructures.</p>



<p>Ils offrent également davantage de souplesse dans la configuration DNS, notamment pour les environnements intégrant des CDN, des plateformes externes ou des architectures cloud distribuées.</p>



<h2 class="wp-block-heading"><strong>Comment les configurer chez OVHcloud&nbsp;?</strong><strong></strong></h2>



<p>Les enregistrements SVCB et HTTPS sont disponibles depuis votre&nbsp;<a href="https://www.ovh.com/auth/?onsuccess=https%3A//manager.eu.ovhcloud.com&amp;ovhSubsidiary=FR" data-wpel-link="exclude">espace client</a>.</p>



<p>Pour les configurer&nbsp;:</p>



<ol class="wp-block-list">
<li>rendez-vous dans la section «&nbsp;Noms de domaine&nbsp;»&nbsp;;</li>



<li>sélectionnez le domaine concerné&nbsp;;</li>



<li>accédez à l’onglet «&nbsp;Zone DNS&nbsp;»&nbsp;;</li>



<li>ajoutez un nouvel enregistrement de type SVCB ou HTTPS.</li>
</ol>



<p>Selon votre situation, il peut être nécessaire d’adapter les paramètres associés (priorité, cible, options spécifiques au service). Pour des informations détaillées sur la gestion des enregistrements DNS, consultez notre&nbsp;<a href="https://help.ovhcloud.com/csm/fr-dns-zone-records?id=kb_article_view&amp;sysparm_article=KB0063452" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">guide dédié</a>.</p>



<h2 class="wp-block-heading"><strong>En résumé&nbsp;: un DNS plus flexible et performant</strong><strong></strong></h2>



<p>Le DNS reste un pilier essentiel d’Internet et continue d’évoluer pour s’adapter aux architectures récentes.</p>



<p>Avec les enregistrements SVCB et HTTPS, il devient possible d’optimiser l’exposition des services, de simplifier certaines configurations (notamment à la racine du domaine) et d’améliorer la performance dès la phase de résolution.Il s’agit d’une évolution technique discrète, mais stratégique, face aux exigences croissantes de rapidité, de sécurité et de flexibilité.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fenregistrements-dns-comprendre-role-evolutions-svcb-https%2F&amp;action_name=Enregistrements%20DNS%C2%A0%3A%20comprendre%20leur%20r%C3%B4le%20et%20les%20%C3%A9volutions%20SVCB%2FHTTPS&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>An introduction to DNSSEC</title>
		<link>https://blog.ovhcloud.com/an-introduction-to-dnssec/</link>
		
		<dc:creator><![CDATA[Eric Vergne]]></dc:creator>
		<pubDate>Fri, 16 Oct 2020 14:14:40 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ovh.com/blog/?p=19318</guid>

					<description><![CDATA[DNS (Domain Name System) is the &#8220;phone book&#8221; of the internet &#8211; meaning that it translates a human-readable domain name (like ovhcloud.com) into a computer-readable IP (54.39.46.56). The DNS was designed when the internet first started. At that time, the Internet was not as big, or critical as it is today.DNS, therefore, was designed on [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fan-introduction-to-dnssec%2F&amp;action_name=An%20introduction%20to%20DNSSEC&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2020/10/IMG_0323-1024x537.png" alt="DNSSEC" class="wp-image-19435" width="768" height="403" srcset="https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0323-1024x537.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0323-300x157.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0323-768x403.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0323.png 1200w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure></div>



<p>DNS (Domain Name System) is the &#8220;phone book&#8221; of the internet &#8211; meaning that it translates a human-readable domain name (like ovhcloud.com) into a computer-readable IP (54.39.46.56).</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="624" src="https://www.ovh.com/blog/wp-content/uploads/2020/10/IMG_0311-1024x624.png" alt="DNS request" class="wp-image-19419" srcset="https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0311-1024x624.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0311-300x183.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0311-768x468.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0311.png 1532w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The DNS was designed when the internet first started. At that time, the Internet was not as big, or critical as it is today.<br>DNS, therefore, was designed on a principle of trust. As a result, DNS is not really secure and has vulnerabilities; such as DNS cache poisoning.</p>



<p>This kind of attack allows the attacker to enter invalid information into a DNS resolver cache, so that following DNS queries<br>return invalid data. This enables the attacker to redirect you to a fake website.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2020/10/dns-poisoning-1.gif" alt="" class="wp-image-19423" width="768" height="400"/></figure>



<p>To secure the DNS zone, the DNSSEC (Domain Name System Security Extensions) has been designed &#8211; based on public key encryption &#8211; to verify and validate the integrity and the origin of DNS data.</p>



<h3 class="wp-block-heading">How DNSSEC works</h3>



<p>The goal of DNSSEC is to allow resolvers to check the origin and integrity of a DNS answer. DNSSEC has been<br>designed with the following constraints:</p>



<ul class="wp-block-list"><li>It has to be an extension of DNS so a non-DNSSEC client can work with a DNSSEC server and vice-versa. </li><li>The data is protected, but the communication channels are not. </li><li>It must be based on public key encryption</li></ul>



<p>Since DNSSEC, by design, should not change the DNS protocol, new types of DNS records, Resource Records, have been added to handle cryptography.</p>



<h4 class="wp-block-heading">RRSIG</h4>



<p>RRSIG contains the cryptographic signature of a record set. With DNSSEC, each record set is followed by a RRSIG containing,<br>among others, the signature in base64 of the record set.</p>



<p><br>For example:</p>



<pre class="wp-block-code"><code class="">$ dig A +dnssec dnstests.ovh
dnstests.ovh.        3600    IN  A   213.186.33.5
dnstests.ovh.        3600    IN  RRSIG   A 8 2 3600 20200925080215 20200826080215 50238 dnstests.ovh. AUz7u4Sq0EkSUq5kR0beowmMuscbzGdb3NI/OhCG8Ow0Z3CqgG0/94eR     6pbG7YJwvCFBU1bQDklLYEfc4mg41VeAVY4xPSv0O76/hEZsVKcBOGlT nKy3wV4ft8ykV1Jl+5q2eJAaZRoBSvHuRItbM2HCyghhDW0gKBy5rqOq BlM=</code></pre>



<p>The RRSIG record contains common DNS fields (domain name, ttl, etc.), but also other fields</p>



<ul class="wp-block-list"><li><code>A</code>: Type covered</li><li><code>8</code>: Algorithm used to sign</li><li><code>2</code>: Number of labels of the RRSET (here 2: 1 for dnstests and 1 for OVH)</li><li><code>3600</code>: Original TTL</li><li><code>20200925080215</code>: Signature expiration date</li><li><code>20200826080215</code>: Signature inception date</li><li><code>50238</code>: KeyTag (non uniq indentifier)</li><li><code>dnstests.ovh.</code>: Signer&#8217;s name</li><li><code>AUz7u4Sq0EkSUq5k…:</code> =&gt; The Signature</li></ul>



<h4 class="wp-block-heading">RRSIG signature</h4>



<p>The signature is calculated according to the following formula:</p>



<pre class="wp-block-code"><code class="">signature = sign( RRSIG_RDATA | RR(1) | RR(2)... )</code></pre>



<p>where</p>



<pre class="wp-block-code"><code class="">|  is used for concatenation
RRSIG_RDATA is the RRSIG in wire format
RR(*) = owner | type | class | TTL | RDATA length | RDATA</code></pre>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2020/10/IMG_0320.jpg" alt="" class="wp-image-19426" width="582" height="249" srcset="https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0320.jpg 776w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0320-300x128.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0320-768x329.jpg 768w" sizes="auto, (max-width: 582px) 100vw, 582px" /></figure></div>



<h4 class="wp-block-heading">DNSKEY</h4>



<p>In order to validate, a <code>RRSIG </code>resolver needs to know the public key used to sign the record set.</p>



<p>This is stored in a record named <code>DNSKEY</code></p>



<pre class="wp-block-code"><code class="">$ dig DNSKEY +multi dnstests.ovh
dnstests.ovh.        3458 IN DNSKEY 256 3 8 (
                    AwEAAc9juwZVMUrdjPIxMPuOk+ZnVhv+i16B3TTxj1Ft
                    5ABDEbiXyfljJopTCQgmJ4EcNDubhZKezTqGsbpaErw8
                    8yqFwzviv2/U9Mw+Vq1zbS29Hl6XzyWPlnYryXcyVDEw
                    OZlsK0hw6d7A6Xcjjf2srnxpQHpO9pG+etFZxSSEV49j
                    ) ; ZSK; alg = RSASHA256 ; key id = 50238
dnstests.ovh.        3458 IN DNSKEY 257 3 8 (
                    AwEAAZ5F0TSR8PWTrADtdlTcuGWBZ1ehOHy7RtX/ZyA6
                    WQSU+59I8PFWQ6ddD4FX7LfNcaPSd10vjZKmGT9fB8uf
                    IY9xHHrH2zGc6jEI7TkqDOjutVRsBhhis+AO/HDjL9i0
                    tpyoCX3/wHVZ9U0iOIHaR4+vlVJfja6EvuL4s0zhzaY0
                    amP1R8af0E1Rcvyi9S6fFOtECZOrqKlwI9OPQneQ2gD4
                    uXWg97o1kuBvxSg/Ze5NsAIsJu3oShxBPUNmW6hwP8FM
                    tbmft4MqpJ3xiI03FN2t2PwgO3cvCYlyBJRZqo9nqLAz
                    yYheVdoMuBP024bXF1HFDo2n7jZMuDrW7mMfPK8=
                    ) ; KSK; alg = RSASHA256 ; key id = 44329</code></pre>



<p>DNSKEY record contains common DNS fields (domain name, ttl, etc.), but also other fields.</p>



<ul class="wp-block-list"><li><code>256 </code>or <code>257</code>: Flags. A value of 256 indicates that the <code>DNSKEY </code>contains a <code>ZSK </code>and a value of 257 indicates that it contains a <code>KSK</code>.</li><li><code>3</code>: Protocol (Must be equal to <code>3 </code>otherwise record is not valid)</li><li><code>8</code>: Algorithm</li><li><code>AwEAAc9…</code>; Public key</li></ul>



<p>In summary, when a resolver requests a given record type, it receives the set of records and the associated <code>RRSIG</code>. It then had to request the <code>DNSKEY </code>to validate the response.</p>



<h4 class="wp-block-heading">ZSK</h4>



<p>Each zone signed with DNSSEC has a key named <code>ZSK </code>used to sign the whole record set.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2020/10/IMG_0321-1024x875.png" alt="" class="wp-image-19428" width="768" height="656" srcset="https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0321-1024x875.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0321-300x256.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0321-768x656.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0321.png 1167w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure>



<p>If we trust the ZSK, we know that we can trust all records in the zone. But how do we validate the <code>ZSK</code>?</p>



<h3 class="wp-block-heading">KSK</h3>



<p>In the same way that the <code>ZSK </code>is used to sign the record set, the DNSSEC use another key &#8211; the <code>KSK </code>(Key Signing Key) &#8211; which is used to sign the <code>ZSK DNSKEY</code>.</p>



<p>So let&#8217;s imagine we want to retrieve and validate an <code>A </code>record for domain name <code>dnstests.ovh</code>.</p>



<p>First we ask for <code>A</code>:</p>



<pre class="wp-block-code"><code class="">$ dig A +dnssec dnstests.ovh
dnstests.ovh.        3283    IN  A   213.186.33.5
dnstests.ovh.        3283    IN  RRSIG   A 8 2 3600 20200925080215 20200826080215 50238 dnstests.ovh. AUz7u4Sq0EkSUq5kR0beowmMuscbzGdb3NI/OhCG8Ow0Z3CqgG0/94eR 6pbG7YJwvCFBU1bQDklLYEfc4mg41VeAVY4xPSv0O76/hEZsVKcBOGlT nKy3wV4ft8ykV1Jl+5q2eJAaZRoBSvHuRItbM2HCyghhDW0gKBy5rqOq BlM=</code></pre>



<p>Then we ask for <code>DNSKEY</code>:</p>



<pre class="wp-block-code"><code class="">$ dig DNSKEY +multi +dnssec dnstests.ovh
dnstests.ovh.        2954 IN DNSKEY 257 3 8 (
                AwEAAZ5F0TSR8PWTrADtdlTcuGWBZ1ehOHy7RtX/ZyA6
                WQSU+59I8PFWQ6ddD4FX7LfNcaPSd10vjZKmGT9fB8uf
                IY9xHHrH2zGc6jEI7TkqDOjutVRsBhhis+AO/HDjL9i0
                tpyoCX3/wHVZ9U0iOIHaR4+vlVJfja6EvuL4s0zhzaY0
                amP1R8af0E1Rcvyi9S6fFOtECZOrqKlwI9OPQneQ2gD4
                uXWg97o1kuBvxSg/Ze5NsAIsJu3oShxBPUNmW6hwP8FM
                tbmft4MqpJ3xiI03FN2t2PwgO3cvCYlyBJRZqo9nqLAz
                yYheVdoMuBP024bXF1HFDo2n7jZMuDrW7mMfPK8=
                ) ; KSK; alg = RSASHA256 ; key id = 44329
dnstests.ovh.        2954 IN DNSKEY 256 3 8 (
                AwEAAc9juwZVMUrdjPIxMPuOk+ZnVhv+i16B3TTxj1Ft
                5ABDEbiXyfljJopTCQgmJ4EcNDubhZKezTqGsbpaErw8
                8yqFwzviv2/U9Mw+Vq1zbS29Hl6XzyWPlnYryXcyVDEw
                OZlsK0hw6d7A6Xcjjf2srnxpQHpO9pG+etFZxSSEV49j
                ) ; ZSK; alg = RSASHA256 ; key id = 50238
dnstests.ovh.        2954 IN RRSIG DNSKEY 8 2 3600 (
                20200925080215 20200826080215 44329 dnstests.ovh.
                k/huKVd5Skc8PE1CgHl1/MCEjZs6hH1DlLYGHZxG97YK
                YBSwvWQoXGG6ObZKJYCWVqDJWvdz81K7XHLvK34g3AwB
                NyI62Aw00GiaJzpFCkKU+jTVPeVvDKpAKGQxPziWCL/4
                Buj230YyDm38V4amxAeBOz5FcvD8eDu6XYMx4ygvJ3XF
                M7zojtsbqwg7IBJPJUURNfpQi8MbJivelXbh2CJACteB
                8zd2dsj0eZRTLulC15qr7R7zBQqJ8CVuPAVHBYfy2Nu/
                VE2QSe2Q4zzns9TUH/6/g9f8RDMNDhT+Z1lbsaJg9EzH
                x4bqLfjEjnqhrzdS/Fc02e7bILe9YGQ5SQ== )
dnstests.ovh.        2954 IN RRSIG DNSKEY 8 2 3600 (
                20200925080215 20200826080215 50238 dnstests.ovh.
                nrA3yOddNl3695pl8JAwDkjV8oL5VdKyJO2fIrOPSFVr
                EbEVHHxwxSXqlvhV8J2NmB80oV4mM+bzzZUToIWbKd0p
                XOUDz38lu7Ye4uYrJi4/tMSqMy2HUP96xGQUze96riMo
                hiGmOJp6jd+J3LRmO4dOLXW7WB+Q9dwEANjH4/M= )</code></pre>



<p>We are able to validate the record set with <code>RRSIG </code>and <code>ZSK DNSKEY</code>, then we are able to validate<code> ZSK DNSKEY</code> with <code>RRSIG </code>and <code>KSK DNSKEY</code>.</p>



<p>We are now able to trust records from our DNS zone, but we need to be able to transfer the trust of our child zone to its parent.</p>



<h3 class="wp-block-heading">Delegation Signer Records</h3>



<p>An essential characteristic of DNS is its hierarchical structure. DNSSEC uses this particularity to transfer trust from parent<br>zone to child zone. This record, named <code>DS </code>(Delegation Signer) contains the hash: <code>KSK DNSKEY</code>.<br>If the resolver finds <code>DS </code>records in the parent zone, they know that the child-zone must be DNSSEC signed, and will be able to validate<br><code>DNSSKEY </code>on the child zone using the <code>DS </code>record.</p>



<pre class="wp-block-code"><code class="">$ dig DS dnstests.ovh
dnstests.ovh.        172800  IN  DS  44329 8 2 6BDEC6C046B608077A198E19F2C241EB6B05565DE9B0C63DA718DCA2 8F012979</code></pre>



<p><code>DS </code>records contains common DNS fields (domain name, ttl, etc) but also other fields. </p>



<ul class="wp-block-list"><li><code>44329</code>: KeyTag</li><li><code>8</code>: Algorithm</li><li><code>2</code>: Digest Type</li><li><code>6BDEC6…</code>: Digest</li></ul>



<h4 class="wp-block-heading">DS Digest</h4>



<pre class="wp-block-code"><code class="">digest = digest_algorithm( DNSKEY owner name | DNSKEY RDATA);</code></pre>



<p>where</p>



<pre class="wp-block-code"><code class="">| is used for concatenation
DNSKEY RDATA = Flags | Protocol | Algorithm | Public Key</code></pre>



<h3 class="wp-block-heading">The Chain of Trust</h3>



<p>We are now able to fully validate a DNS answer, up to the root DNS servers:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2020/10/IMG_0322-422x1024.png" alt="DNSSEC - Chain of Trust" class="wp-image-19432" width="317" height="768" srcset="https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0322-422x1024.png 422w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0322-124x300.png 124w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0322-633x1536.png 633w, https://blog.ovhcloud.com/wp-content/uploads/2020/10/IMG_0322.png 726w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<h3 class="wp-block-heading">Denial of existence</h3>



<p>Imagine we want to resolve &#8220;doesnotexist.dnstests.ovh.&#8221;. The resolver will send us back to: domain doesn&#8217;t exist. So, how can we<br>validate this denial of existence?</p>



<p>DNSSEC solves this problem by adding two new types of record: <code>NSEC </code>and <code>NSEC3</code>.</p>



<p>Let&#8217;s imaging our dnstests.ovh. has this content</p>



<pre class="wp-block-code"><code class="">$TTL 3600
@    IN SOA dns10.ovh.net. tech.ovh.net. (2020082603 86400 3600 3600000 60)
        IN NS     ns10.ovh.net.
        IN NS     dns10.ovh.net.
        IN A      213.186.33.5
subdomain        IN A      213.186.33.5
subdomain        IN TXT      dnssec
www        IN A      213.186.33.5</code></pre>



<h3 class="wp-block-heading">NSEC</h3>



<p>NSEC works by returning the &#8220;next secure&#8221; record.</p>



<pre class="wp-block-code"><code class="">$ dig A +dnssec doesnotexist.dnstests.ovh
;; status: NXDOMAIN
dnstests.ovh.        18  IN  NSEC    subdomain.dnstests.ovh. A NS SOA RRSIG NSEC DNSKEY</code></pre>



<p>The <code>NSEC </code>record contains common DNS fields (domain name, ttl, etc), but also other fields: </p>



<ul class="wp-block-list"><li><code>subdomain.dnstests.ovh</code>: next domain name (in alphabetical order)</li><li><code>A NS SOA RRSIG NSEC DNSKEY</code>: types associated with the current request. It tells us that a current domain name <br><code>dnstests.ovh.</code> only have <code>A NS SOA RRSIG NSEC DNSKEY</code> records.</li></ul>



<p>The problem with NSEC is that it&#8217;s possible to enumerate all entries in a zone. Let&#8217;s have a look:</p>



<pre class="wp-block-code"><code class="">$ dig A +dnssec a.dnstests.ovh
dnstests.ovh.        60  IN  NSEC    subdomain.dnstests.ovh. A NS SOA RRSIG NSEC DNSKEY</code></pre>



<p>It tells us that the next subdomain is <code>subdomain.dnstests.ovh.</code>, so we can get the next subdomain by adding a letter to the subdomain.</p>



<pre class="wp-block-code"><code class="">$ dig A +dnssec subdomaina.dnstests.ovh
subdomain.dnstests.ovh.        60  IN  NSEC    www.dnstests.ovh. A TXT RRSIG NSEC</code></pre>



<p>In this way, we can obtain the complete contents of the zone.</p>



<h3 class="wp-block-heading">NSEC3</h3>



<p><code>NSEC3 </code>was added to prevent an attacker from walking the zone. It works the same way as the <code>NSEC</code>, but it constructs a chain of hashed and not plain text resource records. In the case of <code>NXDOMAIN</code>, it returns the hash before and after (in alphanumerical order) the hash of a requested domain name.</p>



<pre class="wp-block-code"><code class="">$ dig A +dnssec doesnotexist.dnstests.ovh.
;; status: NXDOMAIN
dnstests.ovh.        60  IN  SOA dns10.ovh.net. tech.ovh.net. 2020082604 86400 3600 3600000 60
E9NLBQ2G28AO5L4JR8UBJR3QODN9PE63.dnstests.ovh. 60 IN NSEC3 1 0 8 1981905ED56A6CE2 SA9BM55PF37IOPN95F1PCIG733K2SQIJ A TXT RRSIG
SA9BM55PF37IOPN95F1PCIG733K2SQIJ.dnstests.ovh. 60 IN NSEC3 1 0 8 1981905ED56A6CE2 BKF3VT8D74NQJVTR798OI8E6TP8C70F2 A NS SOA RRSIG DNSKEY NSEC3PARAM</code></pre>



<p><code>NSEC3 </code>record contains common DNS fields (domain name, ttl, etc), but also other fields:</p>



<ul class="wp-block-list"><li>1: Hash algorithm</li><li><code>0</code>: Flags</li><li><code>5</code>: Number of iterations for hash</li><li><code>C149E2F3213D3F51</code>: Salt value</li><li><code>SA9BM55PF37IOPN95F1PCIG733K2SQIJ</code>: Next hashed domain name</li><li><code>A TXT RRSIG</code>: Types associated with current request</li></ul>



<p>When a resolver asks for a domain and received a <code>NXDOMAIN </code>they can compute the hash of the requested domain and compare it (alphanumerically) to the hashes received in <code>NSEC3</code>.</p>



<p>For example, for<code> dnstests.ovh.</code> we have:</p>



<pre class="wp-block-code"><code class="">hash(dnstests.ovh.) = SA9BM55PF37IOPN95F1PCIG733K2SQIJ
hash(www.dnstests.ovh.) = BKF3VT8D74NQJVTR798OI8E6TP8C70F2
hash(subdomain.dnstests.ovh.) = E9NLBQ2G28AO5L4JR8UBJR3QODN9PE63
hash(doesnotexist.dnstests.ovh.) = KSR3B14N7QTGS3536MR6N1AOA97LORK3</code></pre>



<p>If we look at <code>NSEC3 </code>records we got during dig: </p>



<pre class="wp-block-code"><code class="">E9NLBQ2G28AO5L4JR8UBJR3QODN9PE63.dnstests.ovh. 60 IN NSEC3 1 0 8 1981905ED56A6CE2 SA9BM55PF37IOPN95F1PCIG733K2SQIJ A TXT RRSIG</code></pre>



<p>Means than <code>subdomain.dnstests.ovh.</code> has <code>A</code>, <code>TXT </code>and <code>RRSIG </code>record types and that next subdomain is <code>dnstests.ovh.</code></p>



<pre class="wp-block-code"><code class="">SA9BM55PF37IOPN95F1PCIG733K2SQIJ.dnstests.ovh. 60 IN NSEC3 1 0 8 1981905ED56A6CE2 BKF3VT8D74NQJVTR798OI8E6TP8C70F2 A NS SOA RRSIG DNSKEY NSEC3PARAM</code></pre>



<p>Means than <code>dnstests.ovh.</code> has <code>A</code>, <code>NS</code>, <code>SOA</code>, <code>RRSIG</code>, <code>DNSKEY </code>and <code>NSEC3PARAM </code>record types and that next subdomain is www.dnstests.ovh.</p>



<p>So we have received the information telling us that <code>doesnotexist.dnstests.ovh.</code> does not exist (<code>NXDOMAIN</code>),<br>the hash just before (in alphanumeric order): <code>E9NLBQ2G28AO5L4JR8UBJR3QODN9PE63</code>, the hash just after <code>SA9BM55PF37IOPN95F1PCIG733K2SQIJ</code>, so we know that <code>NXDOMAIN </code>is valid.</p>



<h1 class="wp-block-heading">To conclude</h1>



<p>DNSSEC is an extension of the DNS used to secure the DNS data, not the communication channel. It means that DNSSEC does not encrypt the zone, but it ensures that the received zone was sent, and has not been modified, by its owner. DNS records are cryptographically signed, so DNSSEC introduces the new DNS record types for cryptography.</p>



<p>One of the biggest advantages of DNSSEC is that it&#8217;s compatible with the DNS &#8211; but to be secure the whole chain of trust must mean using the DNSSEC from child to root.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fan-introduction-to-dnssec%2F&amp;action_name=An%20introduction%20to%20DNSSEC&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DNS Flag Day, what does it change ?</title>
		<link>https://blog.ovhcloud.com/dns-flag-day-what-does-it-change/</link>
		
		<dc:creator><![CDATA[Guillaume Marchand]]></dc:creator>
		<pubDate>Thu, 31 Jan 2019 14:35:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Conformity]]></category>
		<category><![CDATA[DNS]]></category>
		<guid isPermaLink="false">https://blog.ovh.com/fr/blog/?p=14372</guid>

					<description><![CDATA[On this February 1st, the DNS (Domain Name System [1]) protocol is going to undergo a new big change…<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fdns-flag-day-what-does-it-change%2F&amp;action_name=DNS%20Flag%20Day%2C%20what%20does%20it%20change%20%3F&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>On this <strong>February 1st</strong>, the DNS (<em>Domain Name System </em><a href="#footnote-1">[1]</a>) protocol is going to undergo a new big change…</p>



<h3 class="wp-block-heading">A bit of Context</h3>



<p><strong>DNS protocol</strong> has been a key component of the functionality of the Internet for the last 30 years, and still is. It associates domain names (e.g.&nbsp;<em>www.ovh.com</em>) to the numerical IP addresses (e.g. 198.27.92.1) needed for locating and identifying websites or other computer services. This protocol is usually described as <strong>the web directory</strong>.</p>



<p>As the Internet, and technologies running it, are quickly evolving, of course the DNS protocol has already evolved many times along its <strong>30 years</strong> of existence.</p>



<p>Today, we especially have a look on its first extension, called <strong><em>EDNS</em></strong> <a href="#footnote-2">[2]</a>, which is at the heart of the so-called <strong>DNS Flag Day</strong>.</p>



<h3 class="wp-block-heading">EDNS, What’s this thing ?</h3>



<p>This extension added <strong>new functionalities</strong> to the ones bring by the DNS protocol.</p>



<p>Ten years ago, this extension was key to give birth to the <strong><em>DNSSEC</em></strong><a href="#footnote-3"> [3]</a> which is solving some security issues around DNS protocol by securing certain kinds of information provided by the DNS through cryptographically signed responses.</p>



<p>Unfortunately, many DNS servers in the world don’t have this EDNS extension. Sometimes, the extension doesn’t correctly comply with the standards, or, even worst, is simply blocked !</p>



<p>To guarantee<strong> the stability </strong>of the domain names resolution (i.e. the translation of a domain name into an IP address), resolver&#8217;s infrastructures had to heap up numerous modifications to manage all known <strong>exceptions</strong>.</p>



<h3 class="wp-block-heading">2019 February 1st – Day one</h3>



<p>These exceptions degrade significantly Domain Names resolution, and therefore directly the user experience. Moreover, it’s complicated to maintain so many patches over time.</p>



<p>For all these reasons, the <strong>DNS Flag Day</strong> has been created. From the first day of 2019 February, exceptions implemented in the resolvers will progressively be removed.</p>



<p>You will probably not notice much difference on D-day, but as updates are made to the DNS servers, resolutions may be compromised.</p>



<h3 class="wp-block-heading">Who will be impacted?</h3>



<p>OVH infrastructures are <strong>compatible with EDNS</strong>, no impact is to be expected if you use the DNS services managed by OVH.</p>



<p>If your DNS zone is not hosted on OVH DNS, we recommend you to ensure your service provider has done the necessary.</p>



<p>In case you are not able to be ready by February 1st, you still have the possibility to migrate your DNS zone on our infrastructure.</p>



<p>Our guides:</p>



<ul class="wp-block-list"><li><a href="https://docs.ovh.com/gb/en/domains/web_hosting_general_information_about_dns_servers/" data-wpel-link="exclude">Editing the DNS servers for an OVH domain name</a></li><li><a href="https://docs.ovh.com/gb/en/domains/web_hosting_how_to_edit_my_dns_zone/" data-wpel-link="exclude">Editing an OVH DNS zone</a></li></ul>



<h3 class="wp-block-heading">Am I being impacted?</h3>



<div class="wp-block-image"><figure class="aligncenter is-resized"><a href="https://dnsflagday.net/#domain-holders" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><img loading="lazy" decoding="async" src="https://www.ovh.com/blog/wp-content/uploads/2019/01/Capture-d’écran-2019-01-31-à-15.12.14.png" alt="" class="wp-image-14382" width="664" height="476" srcset="https://blog.ovhcloud.com/wp-content/uploads/2019/01/Capture-d’écran-2019-01-31-à-15.12.14.png 885w, https://blog.ovhcloud.com/wp-content/uploads/2019/01/Capture-d’écran-2019-01-31-à-15.12.14-300x215.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2019/01/Capture-d’écran-2019-01-31-à-15.12.14-768x551.png 768w" sizes="auto, (max-width: 664px) 100vw, 664px" /></a></figure></div>



<p>The easier way for you to be sure is by checking if your domain name is compatible via the tools provided by <a href="https://dnsflagday.net/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">DNSFlagDay</a>. An <strong>online tool</strong> is available :<strong>DNS Flag Day</strong> is a cross organization effort and can be trusted.</p>



<h3 class="wp-block-heading">To go further</h3>



<p>The .<em>cz</em> extension registry has put online <a href="https://gitlab.labs.nic.cz/knot/edns-zone-scanner/tree/master" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">a tool to scan any extension</a> and check its compatibility with resolution using EDNS:</p>



<p>The <strong>AFNIC</strong> has carried out a test for the <em>.fr</em> TLD. In their results, available <a href="https://www.afnic.fr/fr/ressources/blog/1er-fevrier-2019-le-dns-va-t-il-trembler.html#" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">here</a>, we see that <strong>3.49% of <em>.fr</em> domains</strong> will probably be impacted.</p>



<ul class="wp-block-list"><li id="footnote-1">[1] DNS, <a href="https://tools.ietf.org/html/rfc1034" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">RFC1034</a> &amp; <a href="https://tools.ietf.org/html/rfc1035" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">RFC1035</a></li><li id="footnote-2">[2] EDNS, <a href="https://tools.ietf.org/html/rfc2671" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">RFC2671</a> &amp; <a href="https://tools.ietf.org/html/rfc6891" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">RFC6891</a></li><li id="footnote-3">[3] DNSSEC, <a href="https://tools.ietf.org/html/rfc4033" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">RFC4033</a></li></ul>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fdns-flag-day-what-does-it-change%2F&amp;action_name=DNS%20Flag%20Day%2C%20what%20does%20it%20change%20%3F&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
