
Engineer's DNS Intelligence Report
This domain uses short TTLs across 3 record types (A record at 120s), consistent with DNS-based traffic management (GSLB). Enterprises operating large anycast networks intentionally use short TTLs to enable rapid failover, geographic steering, and load distribution. This is a deliberate infrastructure choice, not a misconfiguration. RFC 1035 §3.2.1 permits any TTL value the zone administrator selects. The findings below reflect deviation from typical values for reference, not necessarily actionable recommendations for this class of infrastructure.
The following DNS record TTLs deviate from typical values. For domains using DNS-based traffic management, short TTLs are expected and intentional.
| Record Type | Observed TTL | Typical TTL | Severity | Context |
|---|---|---|---|---|
| A | 2 minutes (120s) |
1 hour (3600s) |
high | A TTL is below typical — observed 2 minutes (120s), typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-18 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| NS | 6 hours (21600s) |
1 day (86400s) |
medium | NS TTL is below typical — observed 6 hours (21600s), typical value is 1 day (86400s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 86400 seconds per NIST SP 800-53 SI-18 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| TXT | 2 minutes (120s) |
1 hour (3600s) |
high | TXT TTL is below typical — observed 2 minutes (120s), typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-18 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| SOA | 6 hours (21600s) |
1 hour (3600s) |
high | SOA TTL is above typical — observed 6 hours (21600s), typical value is 1 hour (3600s). Long TTLs reduce DNS query volume but slow propagation when records change. Consider 3600 seconds for a balance of performance and flexibility per NIST SP 800-53 SI-18 relevance guidance. |
| MX | 2 minutes (120s) |
1 hour (3600s) |
high | MX TTL is below typical — observed 2 minutes (120s), typical value is 1 hour (3600s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 3600 seconds per NIST SP 800-53 SI-18 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
Big Picture Questions
- This domain runs short TTLs across multiple record types. Does it operate a global anycast network where DNS-based traffic steering justifies the query volume?
- Are the short TTLs enabling active failover, geographic routing, or load distribution — or are they leftover from a migration that was never reverted?
- Enterprise-grade DNS infrastructure (sub-5ms authoritative response times, globally distributed nameservers) absorbs short-TTL query volume. Would your authoritative DNS handle the same load?
ns11.globehosting.net
2026020701
techteam.instra.com
| Timer | Value | RFC 1912 Range |
|---|---|---|
| Refresh | 3600s | 1,200–43,200s (20 min – 12 hrs) |
| Retry | 1800s | Fraction of Refresh |
| Expire | 1209600s | 1,209,600–2,419,200s (14–28 days) |
| Minimum (Neg. Cache) | 86400s | 300–86,400s (5 min – 1 day) |
| Parameter | Current | Suggested | Severity | Rationale |
|---|---|---|---|---|
| timeout_seconds | 5s |
8s |
low | Average scan duration is 30.0s, suggesting DNS responses are slow for this domain. Increasing timeout from 5s to 8s prevents premature resolution failures. RFC 8767 |
Add a rua= tag to receive aggregate DMARC reports. Without reporting, you cannot monitor authentication failures.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _dmarc.spjslatina.ro (add to existing DMARC record) |
| Value | rua=mailto:dmarc-reports@spjslatina.ro |
DNSSEC is not enabled for this domain. DNSSEC provides cryptographic authentication of DNS responses, preventing cache poisoning and DNS spoofing attacks.
Your DMARC policy is set to quarantine. Upgrade to p=reject for maximum protection — reject instructs receivers to discard spoofed mail entirely rather than quarantining it.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _dmarc.spjslatina.ro (update existing DMARC record) |
| Value | v=DMARC1; p=reject; rua=mailto:dmarc-reports@spjslatina.ro |
CAA records specify which Certificate Authorities may issue certificates for your domain, reducing the risk of unauthorized certificate issuance.
| Field | Value |
|---|---|
| Type | CAA |
| Host | spjslatina.ro (root of domain — adjust CA to match your provider) |
| Value | 0 issue "letsencrypt.org" |
MTA-STS enforces TLS encryption for inbound mail delivery, preventing downgrade attacks on your mail transport.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _mta-sts.spjslatina.ro (MTA-STS policy record) |
| Value | v=STSv1; id=spjslatina.ro |
Email Security Methodology Can this domain be impersonated by email? Unlikely SPF and DMARC quarantine policy enforced
SPF Record RFC 7208 §4 Consistent
SPF valid with industry-standard soft fail (~all), 4/10 lookups
DMARC Policy RFC 7489 §6.3 Consistent
DMARC policy quarantine (100%) - good protection
pct= with t= (testing flag), add np= (non-existent subdomain policy), and mandate DNS tree walk for policy discovery instead of the Public Suffix List.DKIM Records RFC 6376 §3.6 Consistent
Found DKIM records for 1 selector(s)
l= tag body length vulnerability (attacker appends unsigned content to signed mail),
weak key exploitation (keys below 1024-bit are cryptographically breakable per RFC 6376 §3.3.3),
DKIM replay attacks (re-sending legitimately signed messages at scale)
