
Engineer's DNS Intelligence Report
The following DNS record TTLs deviate from recommended values. Incorrect TTLs can cause caching issues, slow propagation, or unnecessary DNS traffic.
| Record Type | Observed TTL | Typical TTL | Severity | Context |
|---|---|---|---|---|
| NS | 20945s |
1 day (86400s) |
medium | NS TTL is below typical — observed 20945s, typical value is 1 day (86400s). Short TTLs increase DNS query volume but enable faster propagation. If you are preparing for a migration or need rapid failover, this may be intentional (RFC 1035 §3.2.1). For steady-state production, consider 86400 seconds per NIST SP 800-53 SI-18 relevance guidance. Use the TTL Tuner for profile-specific recommendations. |
| SOA | 20945s |
1 hour (3600s) |
high | SOA TTL is above typical — observed 20945s, typical value is 1 hour (3600s). Long TTLs reduce DNS query volume but slow propagation when records change. Consider 3600 seconds for a balance of performance and flexibility per NIST SP 800-53 SI-18 relevance guidance. |
| MX | 4 hours (14400s) |
1 hour (3600s) |
medium | MX TTL is above typical — observed 4 hours (14400s), typical value is 1 hour (3600s). Long TTLs reduce DNS query volume but slow propagation when records change. Consider 3600 seconds for a balance of performance and flexibility per NIST SP 800-53 SI-18 relevance guidance. |
| A | 4 hours (14400s) |
1 hour (3600s) |
medium | A TTL is above typical — observed 4 hours (14400s), typical value is 1 hour (3600s). Long TTLs reduce DNS query volume but slow propagation when records change. Consider 3600 seconds for a balance of performance and flexibility per NIST SP 800-53 SI-18 relevance guidance. |
| TXT | 13745s |
1 hour (3600s) |
medium | TXT TTL is above typical — observed 13745s, typical value is 1 hour (3600s). Long TTLs reduce DNS query volume but slow propagation when records change. Consider 3600 seconds for a balance of performance and flexibility per NIST SP 800-53 SI-18 relevance guidance. |
Big Picture Questions
- How often do you actually change this record? If it hasn’t changed in months, a short TTL is generating unnecessary DNS queries without any benefit.
- Are you preparing for a migration or IP change? Short TTLs make sense temporarily — but should be raised back to 1 hour (3600s) once the change is complete.
- Every DNS lookup adds 20–150ms of latency. With a 60s TTL, returning visitors trigger a fresh lookup every minute. With 3600s, they get cached responses for an hour — faster page loads, no extra infrastructure needed.
- Google runs A records at ~30s because they operate a global anycast network and need to steer traffic dynamically. For a typical website without that infrastructure, copying those TTLs increases query volume with zero upside.
alfa.hostx.ro
2026012201
office.creative-designs.ro
| Timer | Value | RFC 1912 Range |
|---|---|---|
| Refresh | 3600s | 1,200–43,200s (20 min – 12 hrs) |
| Retry | 1800s | Fraction of Refresh |
| Expire | 1209600s | 1,209,600–2,419,200s (14–28 days) |
| Minimum (Neg. Cache) | 86400s | 300–86,400s (5 min – 1 day) |
| Parameter | Current | Suggested | Severity | Rationale |
|---|---|---|---|---|
| timeout_seconds | 5s |
8s |
low | Average scan duration is 30.3s, suggesting DNS responses are slow for this domain. Increasing timeout from 5s to 8s prevents premature resolution failures. RFC 8767 |
Add a DMARC record to protect your domain against email spoofing and receive authentication reports.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _dmarc.spitalmciuc.ro (DMARC policy record) |
| Value | v=DMARC1; p=none; rua=mailto:dmarc-reports@spitalmciuc.ro |
DNSSEC is not enabled for this domain. DNSSEC provides cryptographic authentication of DNS responses, preventing cache poisoning and DNS spoofing attacks.
CAA records specify which Certificate Authorities may issue certificates for your domain, reducing the risk of unauthorized certificate issuance.
| Field | Value |
|---|---|
| Type | CAA |
| Host | spitalmciuc.ro (root of domain — adjust CA to match your provider) |
| Value | 0 issue "letsencrypt.org" |
TLS-RPT (TLS Reporting) sends you reports about TLS connection failures when other servers try to deliver mail to your domain.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _smtp._tls.spitalmciuc.ro (SMTP TLS reporting record) |
| Value | v=TLSRPTv1; rua=mailto:tls-reports@spitalmciuc.ro |
MTA-STS enforces TLS encryption for inbound mail delivery, preventing downgrade attacks on your mail transport.
| Field | Value |
|---|---|
| Type | TXT |
| Host | _mta-sts.spitalmciuc.ro (MTA-STS policy record) |
| Value | v=STSv1; id=spitalmciuc.ro |
Email Security Methodology Can this domain be impersonated by email? Likely SPF alone cannot prevent spoofing
SPF Record RFC 7208 §4 Consistent
SPF valid with strict enforcement (-all), 1/10 lookups
DMARC Policy RFC 7489 §6.3 Consistent
No DMARC record found
pct= with t= (testing flag), add np= (non-existent subdomain policy), and mandate DNS tree walk for policy discovery instead of the Public Suffix List.DKIM Records RFC 6376 §3.6 Consistent
Found DKIM for 1 selector(s) with strong keys (2048-bit)
l= tag body length vulnerability (attacker appends unsigned content to signed mail),
weak key exploitation (keys below 1024-bit are cryptographically breakable per RFC 6376 §3.3.3),
DKIM replay attacks (re-sending legitimately signed messages at scale)
