03 · System overview and DNS
Authoritative edge, DNSSEC-anchored services
glitter.kr runs its own authoritative DNS and application stack as a compact, self-owned edge. The high-level structure can be summarized as follows.
Name servers
ns1–ns5.glitter.kr, self-managed BIND instances under a DNSSEC-signed zone.
Web layer
Nginx reverse proxy on the host, forwarding directly to Uvicorn/FastAPI backends.
Mail layer
Postfix + Dovecot, with DANE-enabled SMTP for inbound and outbound TLS.
Internal network
All application traffic is loopback-only on 127.0.0.1, with no external relay path.
Authoritative DNS servers implement full DNSSEC with separated KSK and ZSK. The zone is automatically re-signed and distributed across ns1–ns5.glitter.kr, and the DS record is correctly configured at the .kr registry.
For SMTP, TLSA records such as _25._tcp.mail.glitter.kr and _587._tcp.mail.glitter.kr are generated from live keys, signed by DNSSEC, and published in sync with certificate changes.
- Nameservers: ns1–ns5, self-hosted BIND only.
- DNSSEC: separate KSK/ZSK with automated ZSK rollover.
- DANE/TLSA: 3 1 1 (DANE-EE, SPKI SHA-256) for SMTP and critical services.
- No external caching, no proxy DNS; validating resolvers can follow the full chain.
Verification commands
dig -4 +dnssec +multi glitter.kr SOA
dig -4 +dnssec +multi glitter.kr DNSKEY
dig -4 +dnssec +multi glitter.kr DS
dig -4 +dnssec +multi glitter.kr TXT
dig -4 +dnssec +multi glitter.kr CAA
dig -4 +trace glitter.kr @a.root-servers.net
dig -4 +dnssec +multi _smtp._tls.glitter.kr TXT
dig -4 +dnssec +multi _25._tcp.mail.glitter.kr TLSA
dig -4 +dnssec +multi _587._tcp.mail.glitter.kr TLSA
dig -4 +dnssec +multi _443._tcp.captcha.glitter.kr TLSA
dig -4 +dnssec +multi glitter.kr SOA @1.1.1.1
dig -4 +dnssec +multi glitter.kr DNSKEY @1.1.1.1
dig -4 +dnssec +multi glitter.kr DS @1.1.1.1
dig -4 +dnssec +multi _smtp._tls.glitter.kr TXT @1.1.1.1
dig -4 +dnssec +multi _25._tcp.mail.glitter.kr TLSA @1.1.1.1
dig -4 +dnssec +multi _587._tcp.mail.glitter.kr TLSA @1.1.1.1
dig -4 +dnssec +multi _443._tcp.captcha.glitter.kr TLSA @1.1.1.1
dig -4 +dnssec +multi +nocmd +noall +answer +comments glitter.kr A
dig -4 +dnssec +multi glitter.kr DS @203.248.252.2
dig -4 +dnssec +multi _mta-sts.glitter.kr TXT
delv -4 +vtrace A glitter.kr
delv -4 nonexistent123.glitter.kr A
delv -4 @1.1.1.1 +vtrace DS glitter.kr
delv -4 @1.1.1.1 _25._tcp.mail.glitter.kr TLSA
delv -4 @1.1.1.1 _587._tcp.mail.glitter.kr TLSA
delv -4 @1.1.1.1 _443._tcp.captcha.glitter.kr TLSA
curl -s https://mta-sts.glitter.kr/.well-known/mta-sts.txt
openssl s_client -starttls smtp -connect mail.glitter.kr:25
The MTA-STS policy is published at https://mta-sts.glitter.kr/.well-known/mta-sts.txt, allowing remote MTAs to verify expected MX and TLS behavior.