Readit News logoReadit News
ResearchAtPlay · 2 years ago
The purpose of this tool is testing if a domain name system follows (or does not follow) the correct specifications:

IBDNS fills a gap in the universe of DNS test tools by offering the possibility of deviating intentionally and on demand from the DNS specifications, and thus simulating incorrect behaviour of authoritative name servers.

ivan888 · 2 years ago
To be pedantic, its purpose is for verification testing of systems that allow for testing of the type you describe
kachapopopow · 2 years ago
I absolutely love this. This will be amazing to trigger unexpected behavior in CoreDNS when working with dnsmasq pods that are resolved via wireguard.

I've had so many issues where I'd lose DNS inside pods and had to reschedule CoreDNS in order for it to start working again, hopefully I can finally trigger this on demand and find a solution for it.

tonetegeatinst · 2 years ago
Somewhat related....I think that while fiber needs to become faster and more affordable and accessable, the other big factor is speed is the latency in DNS. DNS is such a pain to troubleshoot personally,and factors like how fast DNS takes plays a big role in network speed.

Also, for the love that all that is holy, some ISP DNS servers just break if you try using ipv6 only which is just saddening.

citrin_ru · 2 years ago
> DNS is such a pain to troubleshoot personally

I have a different experience - you can query each authoritative server directly to troubleshoot a problem (which makes it easier compare to systems when you have a single endpoint and cannot see beyond it).

Poorly configured by ISP recursive servers though is a common pain - it is relatively easy to create and maintain a well working recursive caching DNS but it looks like ISP just don't care.

notarealllama · 2 years ago
Got off that 75.75.75.75 (Comcast) train years ago. Just wait until you have an ISP that does port 53 blackholing / redirecting. No bueno.
Operyl · 2 years ago
At least DoH is available still for the most part on those ISPs.
sevenseventen · 2 years ago
As opposed to all of the other unintentionally broken DNS servers. SK
Severian · 2 years ago
Perfect addition for me. I use with badssl.com in my toolbox for training and coding tests. Need more "bad example" tools to cover corner cases and understand common failure modes.
maicro · 2 years ago
In case anyone is looking for similar tools needs one for HTTP status codes:

https://httpstat.ushttps://httpstat.us/404

jimbobthrowawy · 2 years ago
Cool website. Can't tell if requests for nonsensical codes like 108 are supposed to return 500 or if that's an error on my side. Returns things like 707 just fine.

Deleted Comment

wolletd · 2 years ago
Name resolution problems are the most bizarre.

And they happen at every level and can combine beautifully. I had a DNS server flooded with Format Error messages, because NTP Pool DNS sent an invalid response for a specific query and two (yet to be identified) clients sent (and still send) that query every second or so, because the response never reaches them. And as the upstream query failed, the DNS server would send the same query every second again to a bunch of other DNS servers, every single response generating another Format Error. Dozens of log lines per second.

Those two generate about 1GB of waste traffic per month. And that's the two buggy machines talking to a small DNS server I manage. I wonder how many junk traffic public DNS servers generate.

ixau · 2 years ago
Excellent!

This is core infrastructure testing at its finest. I'm sure it will reveal bugs and behaviors noone expected.