DNS Server Roles
Authoritative DNS server: holds the actual DNS records for a zone (domain). When queried for names in its zone, it provides authoritative answers. Every public domain must have at least two authoritative name servers for redundancy — identified by NS records. The primary authoritative server holds the read-write copy of zone data; secondary servers hold read-only copies synchronized from the primary via zone transfer.
Recursive resolver (recursive nameserver): performs full DNS resolution on behalf of clients by querying multiple servers (root → TLD → authoritative). ISP DNS servers, Google (8.8.8.8), Cloudflare (1.1.1.1), and corporate internal DNS servers act as recursive resolvers. Clients are configured with resolver IP addresses (via DHCP or manual config).
Caching-only DNS server: performs recursive resolution but holds no authoritative zone data. It caches responses based on TTL values — subsequent queries for the same name are answered from cache without re-querying. All recursive resolvers cache; a caching-only server is dedicated to improving resolution speed.
DNS Zone Types
Forward lookup zone: maps hostnames to IP addresses (the standard A and AAAA records). Reverse lookup zone: maps IP addresses to hostnames (PTR records) — lives in in-addr.arpa (IPv4) or ip6.arpa (IPv6) zone. Primary zone: the read-write original copy of zone data. Secondary zone: a read-only copy synchronized from the primary via zone transfer (AXFR — full, IXFR — incremental). Secondary zones provide redundancy and reduce load on primary.
Stub zone: contains only NS records for another zone — a pointer to the authoritative servers. Used to maintain correct delegation information between separate DNS servers. Conditional forwarder: forwards queries for a specific domain to specified DNS servers (e.g., forward queries for partner.com to their DNS servers). Forwarder: forwards all non-locally-resolvable queries to another DNS server rather than querying root servers directly.
Split-Horizon and DNSSEC
Split-horizon DNS (split-brain DNS): the same domain name resolves to different IP addresses depending on where the query comes from. Internal DNS servers return internal (private) IP addresses for company servers; external DNS servers return public IPs. This allows employees to use internal servers directly while external users reach the public-facing IP.
DNSSEC (DNS Security Extensions): adds digital signatures to DNS records, allowing resolvers to verify record authenticity and detect tampering (man-in-the-middle or cache poisoning). DNSSEC does not encrypt DNS traffic — it only provides integrity. DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypt DNS queries for privacy.