卖逼视频免费看片|狼人就干网中文字慕|成人av影院导航|人妻少妇精品无码专区二区妖婧|亚洲丝袜视频玖玖|一区二区免费中文|日本高清无码一区|国产91无码小说|国产黄片子视频91sese日韩|免费高清无码成人网站入口

DNS域名解析投訴方面的處理案例-201102

幾個(gè)域名解析投訴處理過(guò)程鑒于dig 工具在DNS 解析過(guò)程的良好的能力,請(qǐng)大家使用dig 。1、 域名無(wú)法解析的投訴的處理過(guò)程:1) 在省網(wǎng)、集團(tuán)、google 的DNS 上進(jìn)行解析測(cè)試。--此步驟

幾個(gè)域名解析投訴處理過(guò)程

鑒于dig 工具在DNS 解析過(guò)程的良好的能力,請(qǐng)大家使用dig 。

1、 域名無(wú)法解析的投訴的處理過(guò)程:

1) 在省網(wǎng)、集團(tuán)、google 的DNS 上進(jìn)行解析測(cè)試。--此步驟是初步判斷是我省DNS 問(wèn)

題還是共性問(wèn)題。

省網(wǎng)DNS(211.140.13.188)

C:Documents and Settings?ministrator>dig @211.140.13.188 www.eglihtom.cn

; <<>>DiG 9.3.2 <<>> @211.140.13.188 www.eglihtom.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1865

---NXDOMAIN 即沒(méi)有該域名

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION: ----PC機(jī)發(fā)送的內(nèi)容

;www.eglihtom.cn. IN A

---------查詢www.eglihtom.cn 域名的A 記錄。所謂A 記錄即是IPV4下面域名對(duì)應(yīng)的IP 地址。如果是IPV6,則顯示為AAAA

;; AUTHORITY SECTION:---授權(quán)域應(yīng)答部分

cn. 1 IN SOA a.dns.cn. root.cnnic.cn. 2011492

305 7200 3600 2419200 21600

----以上為授權(quán)域的應(yīng)答,從這個(gè)應(yīng)答看,沒(méi)有eglihtom.cn 域,僅找到cn 域。 ;; Query time: 62 msec

;; SERVER: 211.140.13.188#53(211.140.13.188)

;; WHEN: Fri Feb 18 13:20:55 2011

;; MSG SIZE rcvd: 86

集團(tuán)DNS (211.136.17.107)

C:Documents and Settings?ministrator>dig @211.136.17.107 www.eglihtom.cn

; <<>>DiG 9.3.2 <<>> @211.136.17.107 www.eglihtom.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1683

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;;QUESTION SECTION:

;www.eglihtom.cn. IN A

;; AUTHORITY SECTION:

,

cn. 2371 IN SOA a.dns.cn. root.cnnic.cn. 2011492

272 7200 3600 2419200 21600

;; Query time: 46 msec

;; SERVER: 211.136.17.107#53(211.136.17.107)

;; WHEN: Fri Feb 18 13:21:45 2011 ;; MSG SIZE rcvd: 86

GooleDNS (8.8.8.8)

C:Documents and Settings?ministrator>dig @8.8.8.8 www.eglihtom.cn

; <<>>DiG 9.3.2 <<>> @8.8.8.8 www.eglihtom.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1274

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;;QUESTION SECTION:

;www.eglihtom.cn. IN A

;;AUTHORITY SECTION:

cn. 1795 IN SOA a.dns.cn. root.cnnic.cn. 2011492

283 7200 3600 2419200 21600

;; Query time: 93 msec

;; SERVER: 8.8.8.8#53(8.8.8.8)

;; WHEN: Fri Feb 18 13:08:47 2011 ;; MSG SIZE rcvd: 86

從以上測(cè)試,可以看到www.eglihtom.cn 在三個(gè)域名服務(wù)器上解析,均得到域名不存在的應(yīng)答。從這里基本可以判斷該問(wèn)題不是省網(wǎng)DNS 服務(wù)器的問(wèn)題。

2) 在省網(wǎng)DNS 上進(jìn)行跟蹤測(cè)試。--此步驟為跟蹤域名解析的整體過(guò)程,了解問(wèn)題存在

的環(huán)節(jié)。

C:Documents and Settings?ministrator>dig @211.140.13.188 www.eglihtom.cn tra ce

---跟蹤域名解析過(guò)程的命令,該命令送出后,會(huì)返回域名解析的整個(gè)過(guò)程。 ; <<>>DiG 9.3.2 <<>> @211.140.13.188 www.eglihtom.cn trace

; (1 server found)

;; global options: printcmd

. 3600000 IN NS D.ROOT-SERVERS.NET.

. 3600000 IN NS J.ROOT-SERVERS.NET.

. 3600000 IN NS E.ROOT-SERVERS.NET .

. 3600000 IN NS B.ROOT-SERVERS.NET .

,

. 3600000 IN NS K.ROOT-SERVERS.NET.

. 3600000 IN NS H.ROOT-SERVERS.NET .

. 3600000 IN NS G.ROOT-SERVERS.NET .

. 3600000 IN NS A.ROOT-SERVERS.NET.

. 3600000 IN NS I.ROOT-SERVERS.NET .

. 3600000 IN NS F.ROOT-SERVERS.NET.

. 3600000 IN NS L.ROOT-SERVERS.NET .

. 3600000 IN NS M.ROOT-SERVERS.NET.

. 3600000 IN NS C.ROOT-SERVERS.NET . ;; Received 244 bytes from 211.140.13.188#53(211.140.13.188) in 15 ms

---以上返回為根服務(wù)器(即dot ),任何一個(gè)域名的查詢均從根開(kāi)始。

cn. 172800 IN NS c.dns.cn.

cn. 172800 IN NS b.dns.cn.

cn. 172800 IN NS e.dns.cn.

cn. 172800 IN NS ns.cernet.net.

cn. 172800 IN NS a.dns.cn.

cn. 172800 IN NS d.dns.cn. ;; Received 296 bytes from 192.58.128.30#53(J.ROOT-SERVERS.NET) in 78 ms

--以上返回cn. 的NS 記錄

cn. 21600 IN SOA a.dns.cn. root.cnnic.cn. 2011492 332 7200 3600 2419200 21600

--以上為cn. 的SOA 參數(shù)。 ;; Received 86 bytes from 203.119.27.1#53(c.dns.cn) in 46 ms

---結(jié)束。大家可以查看一個(gè)任何正常的域名,如果www.eglihtom.cn 存在,則下一步必然然后eglihtom.cn 域,而此時(shí)沒(méi)有返回,基本可以斷定不存在該域名。

在跟蹤 www.eglihtom.cn 域名的解析過(guò)程中,在遞歸查詢中,有如下提示

;; Received 296 bytes from 198.41.0.4#53(a.root-servers.net) in 281 ms cn. 21600 IN SOA a.dns.cn. root.cnnic.cn. 2011492 286 7200 3600 2419200 21600

;; Received 86 bytes from 203.119.28.1#53(d.dns.cn) in 125 ms

從這個(gè)反饋的信息看,遞歸解析中僅找到cn. 而沒(méi)有找到eglihtom.cn. ,可以判斷該域不存在;

2),在隨便哪個(gè)域名注冊(cè)網(wǎng)頁(yè)(比如http://www.cndns.com/cn/domain/)對(duì)該域名進(jìn)行查詢,提示可以注冊(cè),說(shuō)明在當(dāng)前的注冊(cè)數(shù)據(jù)庫(kù)中,根本不存在www.eglihtom.cn 域名,故無(wú)法解析。---該步驟為核實(shí)。

2、 ksoa.tec.com.cn 域名無(wú)法解析處理說(shuō)明。

1) 一般性情況確認(rèn)。

省網(wǎng)DNS 情況確認(rèn)

C:Documents and Settings?ministrator>dig @211.140.13.188 ksoa.tec.com.cn

; <<>>DiG 9.3.2 <<>> @211.140.13.188 ksoa.tec.com.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

,

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:

;ksoa.tec.com.cn. IN A

---查詢ksoa.tec.com.cn 的A 記錄 ;; AUTHORITY SECTION:

tec.com.cn. 1 IN SOA .hostmaster.nameserver. 44 2880

0 7200 604800 5

--返回找到tec.com.cn. 域

;; Query time: 250 msec

;; SERVER: 211.140.13.188#53(211.140.13.188)

;; WHEN: Fri Feb 18 13:39:16 2011

;; MSG SIZE rcvd: 89

集團(tuán)DNS 情況確認(rèn)

C:Documents and Settings?ministrator>dig @211.136.17.107 ksoa.tec.com.cn

; <<>>DiG 9.3.2 <<>> @211.136.17.107 ksoa.tec.com.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 494

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:

;ksoa.tec.com.cn. IN A

;; AUTHORITY SECTION:

tec.com.cn. 3600 IN SOA .hostmaster.nameserver. 44 2880

0 7200 604800 5

;; Query time: 187 msec

;; SERVER: 211.136.17.107#53(211.136.17.107)

;; WHEN: Fri Feb 18 13:41:54 2011

;; MSG SIZE rcvd: 89

Google DNS情況確認(rèn)

C:Documents and Settings?ministrator>dig @8.8.8.8 ksoa.tec.com.cn

; <<>>DiG 9.3.2 <<>> @8.8.8.8 ksoa.tec.com.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

,

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1182

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:

;ksoa.tec.com.cn. IN A

;; AUTHORITY SECTION:

tec.com.cn. 1800 IN SOA .hostmaster.nameserver. 44 2880

0 7200 604800 5

;; Query time: 218 msec

;; SERVER: 8.8.8.8#53(8.8.8.8)

;; WHEN: Fri Feb 18 13:42:39 2011

;; MSG SIZE rcvd: 89

2) 跟蹤解析過(guò)程 C:Documents and Settings?ministrator>dig @211.140.13.188 ksoa.tec.com.cn trace

; <<>>DiG 9.3.2 <<>> @211.140.13.188 ksoa.tec.com.cn trace

; (1 server found)

;; global options: printcmd

. 3600000 IN NS D.ROOT-SERVERS.NET. . 3600000 IN NS G.ROOT-SERVERS.NET . . 3600000 IN NS K.ROOT-SERVERS.NET. . 3600000 IN NS I.ROOT-SERVERS.NET . . 3600000 IN NS L.ROOT-SERVERS.NET . . 3600000 IN NS A.ROOT-SERVERS.NET. . 3600000 IN NS H.ROOT-SERVERS.NET . . 3600000 IN NS J.ROOT-SERVERS.NET. . 3600000 IN NS C.ROOT-SERVERS.NET . . 3600000 IN NS B.ROOT-SERVERS.NET . . 3600000 IN NS F.ROOT-SERVERS.NET. . 3600000 IN NS E.ROOT-SERVERS.NET . . 3600000 IN NS M.ROOT-SERVERS.NET. ;; Received 228 bytes from 211.140.13.188#53(211.140.13.188) in 31 ms

cn.172800 IN NS e.dns.cn.

cn. 172800 IN NS b.dns.cn.

cn. 172800 IN NS a.dns.cn.

cn. 172800 IN NS ns.cernet.net. cn. 172800 IN NS d.dns.cn.

cn. 172800 IN NS c.dns.cn.

,

;; Received 296 bytes from 128.8.10.90#53(D.ROOT-SERVERS.NET) in 250 ms

tec.com.cn. 21600 IN NS ns1.dns-diy.com.

tec.com.cn. 21600 IN NS ns2.dns-diy.com.

--可以看到tec.com.cn. 的NS 記錄為ns1.dns-diy.com,ns2.dns-diy.com ,即tec.com.cn 域的授權(quán)DNS 為ns1.dns-diy.com 和ns2.dns-diy.com

;; Received 80 bytes from 203.119.29.1#53(e.dns.cn) in 46 ms

tec.com.cn. 3600 IN SOA .hostmaster.nameserver. 44 2880

0 7200 604800 5

;; Received 89 bytes from 218.85.139.33#53(ns1.dns-diy.com) in 93 ms

以上過(guò)程可以看到,我們省網(wǎng)DNS 已經(jīng)找到了tec.com.cn 的授權(quán)DNS ,但是授權(quán)DNS 返回NXDOMAIN 信息給我們。那么基本可以斷定是授權(quán)DNS 配置出問(wèn)題。

3) 核實(shí)

C:Documents and Settings?ministrator>dig @211.140.13.188 ns1.dns-diy.cn

; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns1.dns-diy.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 642

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:

;ns1.dns-diy.cn. IN A

;; AUTHORITY SECTION:

dns-diy.cn. 1 IN SOA . hostmaster.nameserver. 5 28800

7200 604800 5

;; Query time: 140 msec

;; SERVER: 211.140.13.188#53(211.140.13.188)

;; WHEN: Fri Feb 18 13:48:18 2011

;; MSG SIZE rcvd: 88

C:Documents and Settings?ministrator>dig @211.140.13.188 ns2.dns-diy.cn

; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns2.dns-diy.cn

; (1 server found)

,

;; global options: printcmd ;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1977

;; flags: qrrdra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:

;ns2.dns-diy.cn. IN A

;; AUTHORITY SECTION:

dns-diy.cn. 1 IN SOA . hostmaster.nameserver. 5 28800

7200 604800 5

;; Query time: 125 msec

;; SERVER: 211.140.13.188#53(211.140.13.188)

;; WHEN: Fri Feb 18 13:48:29 2011

;; MSG SIZE rcvd: 88

---連授權(quán)域都找不到,比較暈。

跟蹤授權(quán)域域名的解析過(guò)程。

C:Documents and Settings?ministrator>dig @211.140.13.188 ns2.dns-diy.cn trace

; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns2.dns-diy.cn trace

; (1 server found)

;; global options: printcmd

. 3600000 IN NS D.ROOT-SERVERS.NET. . 3600000 IN NS G.ROOT-SERVERS.NET . . 3600000 IN NS K.ROOT-SERVERS.NET. . 3600000 IN NS I.ROOT-SERVERS.NET . . 3600000 IN NS L.ROOT-SERVERS.NET . . 3600000 IN NS A.ROOT-SERVERS.NET. . 3600000 IN NS H.ROOT-SERVERS.NET . . 3600000 IN NS J.ROOT-SERVERS.NET. . 3600000 IN NS C.ROOT-SERVERS.NET . . 3600000 IN NS B.ROOT-SERVERS.NET . . 3600000 IN NS F.ROOT-SERVERS.NET. . 3600000 IN NS E.ROOT-SERVERS.NET . . 3600000 IN NS M.ROOT-SERVERS.NET. ;; Received 228 bytes from 211.140.13.188#53(211.140.13.188) in 31 ms

cn. 172800 IN NS d.dns.cn.

cn. 172800 IN NS a.dns.cn.

cn. 172800 IN NS c.dns.cn.

,

cn. 172800 IN NS b.dns.cn.

cn. 172800 IN NS ns.cernet.net. cn. 172800 IN NS e.dns.cn.

;; Received 295 bytes from 128.8.10.90#53(D.ROOT-SERVERS.NET) in 265 ms

dns-diy.cn. 21600 IN NS ns2.dns-diy.com. dns-diy.cn. 21600 IN NS ns1.dns-diy.com. ;; Received 79 bytes from 203.119.25.1#53(a.dns.cn) in 140 ms

dns-diy.cn. 3600 IN SOA . hostmaster.nameserver. 5 28800

7200 604800 5

;; Received 88 bytes from 218.107.207.23#53(ns2.dns-diy.com) in 78 ms

---解析ns1.dns-diy.com

C:Documents and Settings?ministrator>dig @211.140.13.188 ns2.dns-diy.com

; <<>>DiG 9.3.2 <<>> @211.140.13.188 ns2.dns-diy.com

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 592

;; flags: qrrdra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:

;ns2.dns-diy.com. IN A

;; ANSWER SECTION:

ns2.dns-diy.com. 600 IN A 218.107.207.23 ns2.dns-diy.com. 600 IN A 218.5.74.111

--幸好,終于有能解析出IP 的域名了。

;; Query time: 31 msec

;; SERVER: 211.140.13.188#53(211.140.13.188)

;; WHEN: Fri Feb 18 13:50:21 2011

;; MSG SIZE rcvd: 65

---在ns2.dns-diy.cn 的授權(quán)域上解析該域

C:Documents and Settings?ministrator>dig @218.107.207.23 ns2.dns-diy.cn ---這個(gè)IP 就是上一步解析得到的IP

; <<>>DiG 9.3.2 <<>> @218.107.207.23 ns2.dns-diy.cn

; (1 server found)

;; global options: printcmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 112

;; flags: qraard; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

,

---好吧,現(xiàn)在可以確定是授權(quán)域直接給出NXDOMAIN 的問(wèn)題,那么可以確定是授權(quán)域配置問(wèn)題了。

;; QUESTION SECTION:

;ns2.dns-diy.cn. IN A

;; AUTHORITY SECTION:

dns-diy.cn. 3600 IN SOA . hostmaster.nameserver. 5 28800

7200 604800 5

;; Query time: 109 msec

;; SERVER: 218.107.207.23#53(218.107.207.23)

;; WHEN: Fri Feb 18 13:50:49 2011

;; MSG SIZE rcvd: 88

標(biāo)簽: