Get AI summaries of any video or article — Sign up free
What is DNS? (and how it makes the Internet work) thumbnail

What is DNS? (and how it makes the Internet work)

NetworkChuck·
5 min read

Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

DNS is the translation layer that maps domain names to IP addresses so browsers can connect to the right servers.

Briefing

Typing a domain name into a browser works because DNS (Domain Name System) translates human-friendly names into the IP addresses computers actually use to connect. Without that translation layer, websites, email, and much of the internet would fail—often in ways users only notice when DNS breaks or is tampered with.

The process starts locally. A browser’s DNS client (a “stub resolver”) first checks its own cache to see whether the domain’s IP address is already known. If it’s not, the stub resolver sends a DNS query to a configured DNS server—commonly an ISP-provided resolver or a public one such as Google Public DNS at 8.8.8.8. That DNS server typically acts as a recursive resolver: it may not know every answer immediately, so it performs additional lookups on the user’s behalf.

To find the right destination, DNS relies on a hierarchy. At the top sit root servers, operated under the governance of ICANN (Internet Corporation for Assigned Names and Numbers). Root servers don’t map specific domains to IP addresses; instead, they point recursive resolvers toward the correct top-level domain (TLD) servers—such as .com, .net, or country codes like .jp. For a domain like academy.networkchuck.com, the recursive resolver asks the .com TLD servers who manages the second-level domain (networkchuck.com). Those TLD servers respond with authoritative name servers for that domain.

In the example, the authoritative DNS provider for networkchuck.com is Cloudflare. The recursive resolver then queries Cloudflare’s authoritative server, which holds the domain’s zone file—records that include the A record mapping academy.networkchuck.com to its IPv4 address (shown as 104.18.40.213 in the walkthrough). Once the recursive resolver has the answer, it updates its cache and returns the IP address to the stub resolver, allowing the browser to connect.

DNS isn’t just a name-to-IP lookup. The zone file can include NS records (which servers are authoritative), AAAA records (IPv6 mappings), MX records (mail servers), PTR records (reverse DNS), CNAME records (aliases), and TXT records (text metadata). TXT records are especially important for email security, where SPF helps identify which mail servers are allowed to send for a domain, and DKIM (via DKIM-related TXT records) helps verify that messages weren’t altered in transit.

Security is a major theme. By default, DNS queries often use UDP port 53 in plaintext, making them vulnerable to interception and manipulation—DNS spoofing can redirect users to malicious IP addresses. Even ISPs can observe DNS lookups. A key mitigation is DNS over HTTPS (DOH), which wraps DNS queries inside encrypted HTTPS traffic so they blend into normal web traffic and can’t be easily read or altered in transit.

The walkthrough also highlights practical deployment: DOH requires both client and DNS server support, and it can be enforced across devices using tools like Twin Gate. Beyond DOH, other protections mentioned include DNS over TLS (DOT), DNSCrypt, and DNSSEC (which validates that responses are authentic). The broader takeaway is that DNS is foundational infrastructure—fast when it works, and surprisingly consequential when it doesn’t.

Cornell Notes

DNS turns domain names into IP addresses through a multi-step lookup process. A local stub resolver checks cache first; if it lacks an answer, it queries a recursive DNS server (often public DNS like 8.8.8.8). Recursive resolvers use a hierarchy: root servers point to TLD servers (like .com), which then point to authoritative servers for the specific domain (example: Cloudflare for networkchuck.com). The authoritative server returns records from its zone file, such as A records mapping academy.networkchuck.com to an IPv4 address. Because DNS is often queried in plaintext (UDP port 53), it can be spoofed or observed, so encrypted options like DNS over HTTPS (DOH) and DNSSEC-style validation matter for security.

Why can’t a browser just use a domain name directly to connect to a website?

Computers route traffic using IP addresses, not human-readable names. A browser may know the domain string (e.g., academy.networkchuck.com) but still needs the corresponding IP address to establish a connection. DNS provides that mapping by answering queries like “What is the IP address for academy.networkchuck.com?”

What’s the difference between a stub resolver and a recursive DNS server?

The stub resolver runs on the client device and typically checks local cache first. If it can’t answer, it forwards the query to a recursive resolver. The recursive resolver performs the full lookup journey—asking root servers, then TLD servers, then authoritative servers—until it finds the final record and returns the IP address.

How do root servers and TLD servers fit into the DNS hierarchy?

Root servers don’t provide domain-to-IP answers. They direct recursive resolvers toward the correct TLD servers by handling the “top-level domain” portion of a name (like .com). TLD servers then delegate further by telling the resolver which authoritative servers manage the “second-level domain” (like networkchuck.com).

What does an authoritative DNS server actually provide?

An authoritative server holds the domain’s zone file and answers questions about specific records. In the example, Cloudflare is the authoritative server for networkchuck.com, and it returns the A record for academy.networkchuck.com (the walkthrough cites 104.18.40.213). Authoritative servers also support other record types like NS, MX, PTR, CNAME, and TXT.

How does DNS become a security risk, and what does DOH change?

Many DNS queries use UDP port 53 in plaintext, so attackers can intercept or spoof responses (DNS spoofing) and redirect users to malicious IP addresses. ISPs can also observe DNS lookups. DNS over HTTPS (DOH) encrypts DNS queries inside HTTPS traffic, hiding them from simple inspection and making spoofing/interception harder.

Why are TXT records important beyond “just text”?

TXT records carry structured security and configuration data. For email, SPF is stored in TXT records to specify which servers are authorized to send mail for a domain. DKIM-related TXT records help verify message integrity, and DMARC is mentioned as another policy mechanism tied to email authentication.

Review Questions

  1. Walk through the lookup path from a stub resolver to an authoritative server for a domain like academy.networkchuck.com.
  2. Which DNS record types would you use to find (a) the mail servers for a domain, (b) the IP address for a hostname, and (c) the domain name for an IP address?
  3. Explain how DOH mitigates the risks of plaintext DNS over UDP port 53.

Key Points

  1. 1

    DNS is the translation layer that maps domain names to IP addresses so browsers can connect to the right servers.

  2. 2

    A stub resolver checks local cache first; if missing, it queries a recursive resolver to perform the full lookup.

  3. 3

    Root servers delegate to TLD servers (e.g., .com), and TLD servers delegate to authoritative servers for the specific domain.

  4. 4

    Authoritative servers answer from zone files using record types like A, AAAA, NS, MX, PTR, CNAME, and TXT.

  5. 5

    Plain DNS over UDP port 53 is vulnerable to interception and spoofing, and ISPs can observe queries.

  6. 6

    DNS over HTTPS (DOH) encrypts DNS lookups inside HTTPS traffic, reducing visibility and tampering risk.

  7. 7

    Email security relies on DNS TXT records such as SPF and DKIM-related records to authenticate senders.

Highlights

DNS works like a name-to-phone-number directory: the browser asks DNS for the IP address, then connects.
The lookup hierarchy is deliberate: root servers point to TLD servers, which point to authoritative servers—each step narrows the search.
Authoritative DNS servers answer from zone files; the A record is what ultimately provides the IPv4 address for a hostname.
Default plaintext DNS (UDP port 53) enables DNS spoofing and easy observation by intermediaries like ISPs.
DOH hides DNS queries by encrypting them inside HTTPS, making DNS traffic harder to identify and manipulate.

Topics

  • DNS Hierarchy
  • Recursive Resolution
  • DNS Security
  • DNS Record Types
  • DOH Encryption

Mentioned