Skip to content

Commit

Permalink
update readme
Browse files Browse the repository at this point in the history
  • Loading branch information
ZHcubGVlQHNrLmNvbSAK committed Sep 30, 2019
1 parent 34301a5 commit e0c7264
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 2 deletions.
2 changes: 2 additions & 0 deletions .idea/robust-dns.iml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,8 @@ so just extending caching duration is not optimal solution for the problem.
- Sending DNS Queries to multiple DNS Servers concurrently
> By sending concurrent queries to multiple DNS servers (for example, default DNS server and a few well-known public DNS servers) and accepting response which arrives first, DNS response is guaranteed within certain boundary of time while minimizing
risk of DNS request failure
- Update Cache record on expiration
> Not just extending cache duration, but by updating the DNS record when it's expired, most DNS queries are guaranteed to be handled by local DNS caches while reducing risk of DNS cache poisoning attack.
- Asynchronous refresh on cache expiration
> Not just extending cache duration, but by updating the DNS record when it's expired (responding with stale result first), most DNS queries are guaranteed to be handled by local DNS caches while reducing risk of DNS cache poisoning attack.
## Test Method
> One of ill performing DNS server in Korea is KT(Korea Telecom) DNS server whose IP address is 168.126.63.1, which is also one of the widely used DNS server.
Expand Down

0 comments on commit e0c7264

Please sign in to comment.