Question 1 (The SOA)
An incorrect SOA primary server value (for example, pointing to a non‑DNS IP such as a storage array) does not, by itself, prevent AD‑integrated DNS zones from replicating or prevent domain controllers from registering or refreshing their SRV/CNAME records.
Key points from the context:
- AD DC locator and replication rely on:
- CNAME records in the
_msdcs.<forest root> zone (GUID-based records for DCs).
- Host (A) records for DCs.
- LDAP/GC/PDC SRV records.
- These records are:
- Registered by the Netlogon service at OS startup, Netlogon startup, and periodically.
- Stored in AD‑integrated DNS zones and replicated by AD replication.
- Failures of replication and DC location are tied to:
- DNS record registration failures (Netlogon / DNS client issues).
- DNS replication failures between DNS servers / DCs.
- Misconfigured DNS scopes, delegations, or forwarders.
The SOA primary server field is a DNS zone metadata field used for zone transfers and some administrative semantics. In an AD‑integrated zone, DCs hosting the zone do not depend on that SOA MNAME value to:
- Register their own CNAME/SRV/A records.
- Replicate the zone via AD replication.
The context attributes DNS replication and record loss to issues such as:
- Replication failures between DNS servers.
- Duplicate zones, wrong replication scopes, or aggressive scavenging.
- Misconfigured delegations or forwarders.
It does not state that an incorrect SOA primary server IP alone will block DCs from registering or refreshing SRV/CNAME records.
So, Theory A’s claim that “because the SOA master was a storage array, DCs could not refresh their records” is not supported by the provided material.
Question 2 (The 7‑Day Window)
The context confirms that:
- DNS scavenging and aging can remove critical DC locator records (CNAME, SRV, A) when they are not refreshed.
- When such records disappear, AD replication and DC location fail with DNS lookup errors (for example, replication error 8524, Event ID 2087).
However, the context does not specify a 7‑day default or standard Windows DNS aging/scavenging interval. It only notes:
- Tombstone lifetime for AD objects (for example, 14 days for NTDS Settings object revival) in the context of AD replication, not DNS scavenging.
- That overly aggressive DNS scavenging can cause DC CNAME records to disappear and lead to replication failures.
Therefore, the general mechanism “records not refreshed → scavenging removes them → replication/LDAP failures” is supported, but a specific 7‑day timing correlation between an SOA change and LDAP failure is not documented in the provided material.
Question 3 (The NIC Toggle)
The context clearly separates two registration mechanisms:
- DNS Client service:
- Registers host (A) records for the machine’s IP.
- Can be forced with
ipconfig /registerdns.
- Netlogon service on a domain controller:
- Registers DC locator records (SRV, CNAME, etc.) required for domain controller location.
- Can be forced with
net stop netlogon / net start netlogon.
From the context:
- “The Net Logon service on a domain controller registers the DNS resource records that are required for the domain controller to be located on the network. The DNS Client service registers the host (A) resource record that the alias (CNAME) record points to.”
- Restarting Netlogon is the supported way to force registration of DC locator records.
The “Register this connection’s addresses in DNS” checkbox controls whether the DNS Client service registers the NIC’s A record. It does not control Netlogon’s ability to register forest‑wide SRV/CNAME records for domain controllers.
So, the technically accurate mapping is:
- NIC checkbox → affects DNS Client A‑record registration.
- Netlogon service → registers SRV/CNAME/DC locator records.
If toggling the NIC setting coincided with a Netlogon restart, that could explain temporary restoration of DC locator records, but the checkbox itself has no documented “authority” over Netlogon’s SRV registration.
Question 4 (The A‑Record at Zone Root in Split‑Brain corp.com)
The context describes several DNS record types that are critical for AD:
-
_msdcs.<forest root> CNAME records for DCs.
-
_ldap._tcp and other SRV records for DC/GC/PDC location.
- Host (A) records for DCs.
It also notes:
- Non‑SRV‑aware clients may query the domain’s A record (DomainDNSName) to locate a DC, but SRV‑aware clients use SRV records.
- Missing DomainDNSName A records can cause certain lookups to fall back to SOA responses, but these A records are not strictly required for SRV‑aware clients.
The context does not state that adding a root A record for the zone (for example, corp.com → public IP) will:
- Delete
_ldap._tcp SRV records.
- Prevent their registration.
SRV records live in their own subdomains (for example, _ldap._tcp.corp.com), and _msdcs CNAMEs live under _msdcs.<forest root>. A root A record at corp.com coexists with these and does not overwrite them.
What a root A record can affect is:
- How non‑SRV‑aware clients resolve
corp.com when trying to locate a DC.
- Internal name resolution behavior in split‑brain scenarios if internal and external views are misconfigured.
But there is no indication in the context that a root A record inherently breaks AD replication or causes SRV records to vanish.
Question 5 (TCP Resets to a Storage Array IP)
The context focuses on DNS and AD replication/locator issues and does not describe TCP handshake behavior or firewall logging semantics.
It does, however, state that when DNS is misconfigured:
- Clients or DCs may query the wrong DNS servers or zones.
- DNS lookup failures lead to replication errors (for example, 8524, Event ID 2087).
- Network traces can show unexpected DNS responses (for example, SOA instead of A records).
There is no explicit description of:
- How a storage array would respond on TCP 443.
- Whether
SYN‑ACK‑RST patterns or SSL/TLS “downgrades” in firewall logs are expected.
Therefore, from the provided material, no conclusion can be drawn about the specific TCP reset and SSL logging behavior.
Overall alignment with Theory A vs. Theory B
Supported by the context:
- DNS misconfiguration and missing DC locator records (CNAME, SRV, A) are primary causes of AD replication and LDAP/DC‑location failures.
- Netlogon restarts and forced DNS registrations (
net stop netlogon / net start netlogon, ipconfig /registerdns) can temporarily restore functionality.
- Overly aggressive or misconfigured DNS scavenging, or DNS replication issues, can cause critical records to disappear.
- Split‑brain DNS misconfiguration can break SSO/AD FS behavior and internal vs. external name resolution.
Not supported by the context:
- An incorrect SOA primary server IP, by itself, blocking DCs from refreshing SRV/CNAME records or causing AD‑integrated DNS replication to fail.
- A root A record at
corp.com inherently deleting or blocking _ldap._tcp SRV records.
- The NIC “Register this connection’s addresses in DNS” checkbox directly controlling Netlogon’s SRV registration.
- Any specific 7‑day timing guarantee tied to SOA changes.
The context points to DNS record registration and DNS/AD replication health (including scavenging and replication scope issues) as the real technical levers. SOA corruption may be a symptom of broader DNS misconfiguration, but it is not documented here as the direct “smoking gun” that prevents SRV/CNAME registration.
References: