I should clarify I wasn’t a upper level sys admin managing those servers, I just used them or maintained accounts being a rank and file technician

While I get the fundamental concept of DNS as a phonebook for your IPs. I am not sure why it is joked around if something goes haywire or someone breaks something.

Is it because if you get no DNS, people can’t log in through their AD accounts, browse the Internet?

Afaik DNS is a bit of a rabbit hole topic, maybe that’s why people joke about it due to DNS being this “No one really knows how this magic name matching box works”?

Please correct me, I’d genuinely like to know why this is prevalent from you guys.

  • JustARegularNerd@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    Only a support tech chiming in, so far I’ve found when it goes wrong, it causes errors or behaviours that are unusual and could be hard to trace back. Clients might be confused as to why their laptop isn’t connecting to some services but their co-worker still can.

    I’ve currently got an infuriating issue where the DNS on my modem just dies at seemingly random intervals. I set up a monitor using Uptime Kuma to let me know when it goes down, and ever since it just hasn’t been a problem yet so I have no idea why it’s going down. I might just set up a pihole and just work around the problem.

  • argarath@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    I don’t know much about much, I’ll admit that, but what I have experienced with DNS is that it keeps shitting the bed when I’m trying to connect to my bfs server in the USA while I live in Brazil. Some spectrum node in Miami or something keeps sending my ping to the moon and my packages go from 0% dropped to 100% when I use a program to trace the path (sadly can’t recall the name RN, hopefully when someone replies I’ll be by my PC again and check it)

    I just wish I could tell my DNS “hey, don’t use that node specifically” because every other step is going just fine, but as I said before, I don’t know much at all so I don’t know if that’s possible or even if it’s a good idea

      • argarath@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        I could try, but the only game this is causing issues is minecraft, and the server is mostly dead by now, so I don’t want to spend the money for just trying to see if it would help, but I’ll def look into it for the next time we play minecraft again

  • dbx12@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Might be related to long TTL on DNS entries making it hard to connect one failure to a thing you changed days ago.

  • tiny@midwest.social
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    When it is the cause of a problem it’s not always obvious at first so you spend hours troubleshooting the broken app until you look at DNS and a simple DNS issue

    • qaz@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      I’ve had a problem like this yesterday. I couldn’t access my paperless instance. I eventually figured out I could access it with an IP + port combination and the DNS lookup failed.

  • hendrik@palaver.p3x.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 month ago

    What’s an example of a joke? Because that’s not what I experienced… In my world people make similar jokes if you mess up any aspect of networking. Same if you break the routing. Or mess up the servers, replication or virtualization infrastructure. DNS is one aspect and people will crack a similar amount of jokes as they do with any other f…-up. (It’s a way to cope with a stressful day or whatever. Or to get some relief.)

  • Nougat@fedia.io
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    I can speak to Windows DNS and AD.

    Yes, the basis of DNS is to match IP addresses with hostnames. But there are plenty of other kinds of DNS records. SPF, DKIM, DMARC use DNS for email validation; AD uses SRV records to point clients to find domain resources. There are also reverse zones, where you send a query for an IP address to learn the hostname(s) associated with it. There are CNAME records that associate a hostname with whatever IP address another hostname is using.

    Point being, there are a lot of different interconnected layers, and if some entry is wrong, it can easily have a cascading effect that creates a problem with something entirely different.

    I would also extend the “It’s always DNS” trope to “It’s always name resolution.” In a Windows environment, at least, DNS name resolution is only used when a FQDN (fully qualified domain name) is being queried. If your application is only looking for [ServerName], NetBIOS name resolution is used.

    When NetBIOS name resolution is used, that is querying a WINS server (if one is specified and exists). In the absence of a WINS server, the query is sent to the “master browser” on your network segment. What machine is the “master browser”? By default, all machines on a network segment (subnet) have a browser election behind the scenes to choose the master browser, based in large part on the machines’ hardware capabilities.

    This means that any machine on the segment (again, by default) can become the master browser and respons to NetBIOS queries. Laptop, desktop, server, doesn’t matter. There are registry entries that can be manipulated to have manual control over what machine is master browser, what machines are and are not allowed to participate in elections, but it is rare that those are configured.

    Why do I know all this? Because about 25 years ago, I came across a situation where different machines were configured with different overlapping subnet masks, and users were trying to browse \servername\share, and getting only partial results. It took a long time to narrow that down to the misconfigured subnet masks. At the company I’m currently at, the developers still use NetBIOS names instead of FQDNs in applications.

    Always use FQDNs in any in-house development. Always use FQDNs when accessing resources by hostname. And if “some weird, inexplicable, possibly intermittent issue” is happening, check name resolution.

  • scsi@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    In addition to the other comments which more directly address your question, DNS has been / can be used to exfiltrate data from “secure” networks. Search “dns data exfiltration” in your favourite search engine and you’ll get several high quality articles. Typical mitigations might be to limit which DNS servers your network can contact, restrict packet sizes to the bare minimum which valid use would have and so forth.

  • tomkatt@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 month ago

    DNS is often misconfigured.

    On the linux side of things, people like to manually edit /etc/resolv.conf when it’s actually a symlink and changes to it don’t persist on boot (the real file location varies, but it’s usually in something like /etc/system/resolve). And forget bind9, if it’s not MS DNS it’s not DNS to some folks.

    On the Windows side, people love to ignore that reverse DNS exists, even though so many things use it. They also freaking love CNAME aliases and break stuff in interesting ways (for example, a “load balanced” configuration that’s all just the first node acting as all three nodes of a cluster or pool).

    Many people only know enough DNS to be dangerous and come up with really jank workarounds to get things running because they don’t understand the proper solutions.

  • IphtashuFitz@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I never would have thought of it but I recently saw a novel use of DNS to exfiltrate data from a compromised server.

    My employer takes security very seriously. Our public facing web servers are very thoroughly locked down, or so we thought. We contract with companies like HackerOne to perform penetration testing etc. One of their white hat hackers managed a remote command attack, and copied data off of the server via a string of DNS queries.

    Suppose the hacker owned the domain example.com, and he had his own authoritative nameserver for it. He just ran a series of commands that took, for example, a password file, and ran DNS queries for line1.example.com, line2.example.com, line3.example.com and so on for each line in the file. As a result the log file on his DNS server collected each line of the password file as it responded to each query.

    • archomrade [he/him]@midwest.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      I’m trying to digest this

      You’re saying he was stealing data from the target server by appending it line-by-line to dns requests sent to his nameserver? Wouldn’t he have needed to both be on the target server and already have access to the data?

      • PlexSheep@infosec.pub
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        Could be used to exfiltrate data when you only can make commands, but not see their output. There might be other and easier exfiltration possibilities then, but this is a creative solution that uses a very common protocol and will probably be available on any machine.

      • JackbyDev@programming.dev
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Yes, but it’s not necessarily as simple as having full ssh access or something like that. Plus getting data out by DNS queries is probably much harder to detect than something like sftp or http posts.

      • IphtashuFitz@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Our web servers are locked down in such a way that you can’t copy data off of them using standard protocols like scp, ftp, and even http, etc. Our firewall blocks all such outbound traffic.

        This hacker found a bug in a framework used on our web servers that let him execute commands remotely. When commands to copy data off the server failed using those more typical methods he switched to a more novel (and difficult) method of leveraging DNS instead. He discovered we weren’t locking DNS down the same way we were locking other protocols down and used that as a way to extract data from our server.

        • archomrade [he/him]@midwest.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 month ago

          Ah, ok, that makes sense! So there was a separate bug in the framework that granted him limited remote access, but because the server had tight control over outbound connections he had to use a novel way of getting the data back out

          Basically: He crawled in through the sewer and then robbed the bank one stack of bills at a time via pigeon courier.

  • xmunk@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Because it’s a fucking unauthoritative clown show that is necessarily decentralized which leads to all sorts of difficult to diagnose (and sometimes impossible to quickly fix) issues.

    It’s like 100% footguns.

  • Shadow@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    100% of the internet depends on it, and 90% of technical people can’t be bothered to learn how it works and understand it. Partly because they only touch it once every 5 years. They get what they need done but don’t understand why it worked, so it ends up feeling like black magic to them.

    • thermal_shock@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 month ago

      used to feel this way about dns until I setup my pihole. I love how dns controls so much behind the scenes.

    • Skull giver@popplesburger.hilciferous.nl
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 month ago

      The worst part isn’t even that they don’t understand it, but that they think they know everything about it after learning the basics. Suddenly you get people blocking port 53/udp “because DNS uses UDP” and people using .dev and .local as internal domain names.

      Still not as misunderstood as NTP, though.

        • It’s fine to use if you’re using it for Bonjour/mDNS (which is enabled by default on basically everything these days). If not, any computer in your network can take on a .local domain of their choosing and your computers will happily resolve it before hitting the DNS server, or you may end up in a race between normal DNS and mDNS. Or you can manually disable mDNS on every machine and hope nothing else causes conflicts, I guess.

          If you need a TLD for fake internal domains, use .internal; that has recently been reserved for internal use and won’t end up in any standard protocols. There’s also a weaker blacklist list that’s part of the gTLD application process which includes .local, but that’s not necessarily set in stone.

      • AndrewZabar@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        If anyone you know claims to have expertise in the computer field and doesn’t know everything about DNS (there’s not much to know) then those people are clueless and by no means are they experts.

        • there’s not much to know

          But there is. Between DNSSEC and EDNS you need to stay on top of stuff or your assumptions may be wrong. many supposed facts about DNS were assumptions by textbook authors that were invalidated years later, and that’s with the stuff that complies with the standards.

          DNS from the 20th century was simple modern DNS really isn’t.

    • AndrewZabar@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      90% of technical people can’t be bothered to learn how it works and understand it

      Playing real fast and loose with the term “technical people.” If you mean just in general people familiar with and comfortable with tech, yeah that’s fine. If you mean those who work or hobby in the IT industry, well then they’re not very good at their jobs and probably should not have those jobs.

  • bfg9k@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    DNS failure can manifest in strange ways and have a sysadmin scratching their head as to why some devices are working fine (statically configured/running from DNS cache), but others cannot access the internet or any of their work services.

    It’s usually the last thing you suspect, because DNS always just works, right?

    • PlexSheep@infosec.pub
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      You’d think so until you have dealt with a few DNS problems. At some point, the mantra of “It’s always DNS” stays in your head when troubleshooting. It’s often the first thing I try nowadays.

  • kobra@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    1 month ago

    There’s even a haiku:

    It’s not DNS
    There’s no way it’s DNS
    It was DNS

  • LordCrom@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Dont forget about resolve.d. Did they ever fix a static DNA entry with DHCP allocated ip? I submitted the bug like 5 years ago

  • shalafi@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I got a story that perfectly illustrates the meme.

    Had done a solid job of setting up my first domain, from scratch. Everything was tooling along nicely for months until my administrator account kept locking itself, every few minutes.

    Logged in with another admin account and hunted for the issue for a month. Since it was affecting only my account, none of the users had issues. Finally found a single sentence in an obscure forum that pointed me. My DNS issue was buried deep in the DHCP settings.

    Despite knowing better, I had used my personal account to authorize interactions between the DNS and DHCP services. When I changed my password, DNS was still trying to use the old credentials, over and over again, locking my account.

    HOLY SHIT! If you google “dns haiku” my image is in the front page twice! Love it!