Fact-checked by Grok 2 weeks ago

CNAME record

A CNAME record, short for Canonical Name record, is a type of resource record in the (DNS) that maps an alias to its or primary , allowing the alias to resolve to the same resources as the target without duplicating records. Introduced in the foundational DNS specification, CNAME records enable efficient by specifying a single in the record's data field, which serves as the canonical name for the alias owner. When a DNS resolver encounters a CNAME record during a query, it follows the alias by querying the canonical name to retrieve the associated records, such as A or records for addresses, without adding extra processing steps beyond standard resolution. This mechanism supports common use cases like creating subdomains that point to external services (e.g., mapping "www.example.com" to "example.net") or simplifying management when multiple names share the same underlying host. Despite their utility, CNAME records have specific restrictions rooted in DNS standards to ensure consistent resolution. A CNAME cannot coexist with other resource record types (except for certain security-related records like SIG or NXT) at the same , as this would create ambiguity in responses; thus, if a CNAME exists for a name, no A, , TXT, or similar records can share that exact name. Additionally, CNAME records are prohibited at the (root) of a , such as "" itself, because the zone apex must host mandatory SOA and records that define the zone's authority and delegation. These limitations, clarified in updates to the original DNS protocol, prevent resolution errors but have led to workarounds like ALIAS or ANAME records in some DNS providers for apex aliasing needs.

Overview

Definition and Purpose

A CNAME record is a type of resource record in the (DNS) that maps an alias domain name to a canonical (primary) domain name, enabling the alias to resolve indirectly to the associated with the canonical name. This mechanism allows multiple domain names to point to the same underlying host without requiring separate address records for each alias. The record type was first specified in RFC 1034 and formally defined in RFC 1035, both published in November 1987 as foundational DNS standards. The primary purpose of CNAME records is to simplify DNS administration by avoiding the duplication of A or AAAA records for equivalent hosts, which streamlines updates to IP addresses or service configurations across multiple names. They support use cases such as aliasing subdomains to service-specific domains, integrating with load balancers or content delivery networks (CDNs), and facilitating service renaming without disrupting existing references. For example, a CNAME record could map "www.example.com" to "lb.example.net", where "lb.example.net" in turn resolves to specific IP addresses via its own A or records, allowing centralized management of the load-balanced endpoints. In the broader DNS resolution process, a CNAME record triggers the substitution of the alias with the canonical name during queries, chaining the lookup accordingly to retrieve the final address records. This indirection promotes flexibility in domain hierarchies while adhering to DNS's distributed naming principles.

Historical Development

The CNAME record emerged as a solution to the limitations of early network naming systems during the era in the 1970s, where hostname-to-address mappings were maintained in a centralized HOSTS.TXT file distributed via FTP by the Network Information Center (NIC). This flat-file approach, formalized in RFC 952, supported basic aliases by allowing multiple names to map to the same address but became inefficient as the grew, leading to duplication of records across hosts and delayed updates due to manual maintenance. The CNAME record formalized DNS's shift to a hierarchical, distributed naming system, enabling scalable aliasing without the redundancies of duplicating resource records in early systems like . The CNAME record was first proposed in RFC 882 and RFC 883 in November 1983, which introduced it as a resource record type for , and was then introduced in 1987 as part of the original (DNS) specification by the (IETF) through RFC 1034 and RFC 1035. These documents defined CNAME as a resource record type to handle in a distributed environment, allowing a (the alias) to point to a canonical name whose records could then be resolved, thus supporting multiple names for the same resource—such as USC-ISIC. aliasing to C.ISI.EDU—while promoting consistency in the hierarchical namespace. This design addressed the need for local name administration amid the Internet's expansion beyond . Subsequent evolution of the CNAME record has been minimal, with key clarifications provided in RFC 2181 in 1997, which addressed ambiguities in the original specification regarding multiple CNAME records at a and their interactions with wildcards. This RFC permitted a single CNAME per alias while allowing coexistence with security-related records like SIG, NXT, and , but prohibited other data types at the same to maintain resolution integrity. No major structural changes have occurred since, though CNAME has been integrated into later DNS extensions, such as DNSSEC via RFC 4033, RFC 4034, and RFC 4035 in 2005, which enable digital signatures on CNAME records for authentication without altering their core functionality.

Technical Specifications

Resource Record Format

In DNS zone files, CNAME records are defined using a specific syntax to map an alias to its name. The format is alias. [TTL] IN CNAME target., where alias. represents the or alias name, TTL () is an optional positive specifying the record's duration in seconds, IN indicates the address class, CNAME denotes the record type, and target. is the (FQDN) to which the alias points. For example:
www.example.com. 3600 IN CNAME actual.example.net.
This entry creates an alias www.example.com that resolves to actual.example.net, with a 1-hour . The name in the target. field must be a valid FQDN, explicitly terminated by a trailing (.) to signify its absolute nature and prevent unintended relative interpretation. CNAME records cannot directly reference addresses; the target must always be a , ensuring the alias points to another DNS name rather than an . Additionally, for internationalized domain names (IDNs) in CNAME targets is provided through the IDNA framework, allowing characters that are encoded as (e.g., xn--bcher-kva.de for "bücher.de") in zone files and wire format, as specified in RFC 5892 published in 2010. On the wire, CNAME records adhere to the standard DNS resource record encoding defined in RFC 1035. The TYPE field is a 16-bit unsigned with value 5 to identify the CNAME type. This is followed by a 16-bit RDLENGTH field indicating the byte length of the RDATA section, and the RDATA itself, which contains the canonical name encoded as a standard DNS (sequence of labels, each prefixed by a length byte, potentially using compression pointers to reference prior names in the DNS message for efficiency). The complete wire format for a CNAME resource record consists of the following components in sequence:
FieldSize (bits)Description
NAMEVariableThe owner name (alias) in DNS wire format.
TYPE16Set to 5 for CNAME.
CLASS16Typically 1 for the IN (Internet) class.
32 value.
RDLENGTH16Length of the RDATA in bytes.
RDATAVariableThe FQDN in compressed DNS wire format.
This structure ensures compact transmission over or , with name compression reducing redundancy in multi-record responses.

DNS Resolution Process

When a DNS resolver queries for a resource record type, such as A or , associated with a that has a CNAME record, the authoritative responds with the CNAME, indicating the queried name is an alias for the specified canonical name. The resolver then substitutes the canonical name for the original queried name and issues a new query for the same record type against the canonical name, repeating this process recursively until it retrieves the final address record (e.g., A or ) or an error condition is met. This alias substitution ensures that the alias inherits the resource records of the canonical name without duplicating data across zones. CNAME records permit chaining, where multiple aliases form a sequence, such as www.example.com (alias1) pointing to alias2.example.net via CNAME, which in turn points to the final target www.target.com. DNS implementations support such chains but enforce depth limits to mitigate infinite loops, with common maximums ranging from 10 to 20 levels depending on the resolver or server software; for instance, the resolver (default configuration as of 2025) fails resolutions exceeding 10 CNAMEs. If a loop is detected—such as two CNAMEs mutually referencing each other—the resolving server returns a SERVFAIL response code to indicate the failure. In DNS responses containing a CNAME, the record specifies the canonical name in the RDATA field, and per the specification, no other resource records of different types should coexist at the same owner name to avoid conflicts. To enhance efficiency, responses often populate the additional data section with relevant records for the canonical name, such as its A or AAAA records, enabling the resolver to obtain the final answer without further queries when possible. This optimization is outlined in the DNS protocol standards.

Practical Usage

Common Applications

CNAME records are frequently employed in web hosting to create aliases for subdomains, such as mapping to the primary domain or a shared hosting provider's canonical name, which simplifies site management and avoids the need to maintain separate IP addresses for multiple hostnames. This approach allows hosting providers to serve content from a single infrastructure while presenting branded subdomains to users. In content delivery networks (CDNs) and load balancing setups, CNAME records direct traffic from custom subdomains like assets.example.com to provider-managed domains, such as cloudfront.net for Amazon CloudFront or akamai.net for Akamai, enabling efficient global distribution of static assets and dynamic content. By aliasing to these endpoints, organizations achieve load distribution across geographically dispersed servers, improving performance and reliability without exposing underlying IP changes. For email and hosted services, CNAME records facilitate custom subdomain aliases, such as mail.example.com pointing to ghs.googlehosted.com for , allowing users to access services under their own domain while leveraging the provider's infrastructure. Note that while MX records for mail routing cannot target CNAMEs due to DNS standards, these aliases support webmail interfaces and related portals without affecting core email delivery. In contemporary environments utilizing (SNI), CNAME records promote certificate reuse by aliasing multiple domains to a shared endpoint, where SNI distinguishes requests and applies the appropriate TLS , minimizing administrative overhead for multi-tenant hosting. This technique is particularly valuable for CDNs, as it ensures secure connections without provisioning unique certificates for each alias. CNAME records integrate with Anycast routing for enhanced failover capabilities, where the aliased domain resolves to anycast-enabled endpoints that automatically route traffic to the nearest available server, providing resilience against outages and reducing latency in distributed systems. In the 2020s, CNAME records have become integral to microservices and serverless architectures, such as in AWS where aliases (functionally similar to CNAMEs) map custom domains to dynamic resources like Application Load Balancers (ALBs) or API Gateway endpoints, supporting scalable deployments without manual IP updates. This usage enables service discovery and traffic management in cloud-native environments, where backend infrastructures evolve rapidly.

Configuration Examples

CNAME records can be configured using various DNS management tools and interfaces, providing flexibility for different environments. These examples illustrate standard setups for common scenarios, such as subdomains to external services or internal hosts. In , a widely used open-source DNS server, CNAME records are defined within zone files using a simple syntax that specifies the alias name, , record type, and target domain. For instance, to alias "blog.example.com" to an external content provider, the entry in the zone file would appear as follows:
blog.example.com.  3600  IN  CNAME  content.provider.com.
This configuration maps queries for "blog.example.com" to "content.provider.com", with a 1-hour . For cloud-based DNS services like AWS Route 53, CNAME records can be created via the console, CLI, or , often in JSON format for . An example request to create a CNAME record pointing "www." to an external (such as a ) is:
json
{
  "ChangeBatch": {
    "Changes": [
      {
        "Action": "CREATE",
        "ResourceRecordSet": {
          "Name": "www.example.com",
          "Type": "CNAME",
          "TTL": 300,
          "ResourceRecords": [
            {
              "Value": "cdn.provider.net."
            }
          ]
        }
      }
    ]
  }
}
This sets a 5-minute TTL for the alias. Note that for AWS-specific resources like S3 bucket endpoints, Route 53 recommends Alias records instead of CNAME for apex domains, but standard CNAME works for subdomains. In environments, cmdlets from the DnsServer module allow programmatic addition of CNAME records. To create an alias for "www" in the "" zone pointing to an internal , use:
Add-DnsServerResourceRecordCName -Name "www" -HostNameAlias "server.internal" -ZoneName "[example.com](/page/Example.com)" -TimeToLive (New-TimeSpan -Minutes 60)
This command adds the record with a 1-hour and requires administrative privileges on a DNS . Wildcards enable CNAME records to apply to multiple subdomains dynamically, as defined in RFC 4592, which clarifies wildcard behavior to avoid unintended matches. For example, to route all unspecified services subdomains to a load balancer:
*.services.[example.com](/page/Example.com).  3600  IN  CNAME  loadbalancer.com.
This matches queries like "api.services." but not more specific entries like "api.services." if overridden. Wildcards must be used cautiously, as they expand only to non-existent names. To verify CNAME configurations, including chains where multiple aliases resolve sequentially, use the dig command-line tool. For example:
dig www.example.com CNAME +short
This outputs the immediate CNAME target, such as "server.internal."; adding +trace reveals the full resolution chain, confirming propagation and correctness.

Limitations and Challenges

Usage Restrictions

CNAME records are prohibited at the apex (root) of a DNS zone, such as for example.com, because the zone apex must include mandatory SOA and NS records, and a CNAME cannot coexist with any other resource records at the same name. This restriction stems from the DNS specification, which mandates that a name with a CNAME record must not have additional data like MX, TXT, or other types, to avoid conflicts during resolution. Regarding TTL and caching, a CNAME record carries its own TTL value, which determines how long resolvers cache the alias mapping to the canonical name; however, the canonical name's records (such as A or AAAA) have separate TTLs, potentially leading to additional resolution steps and caching layers that introduce minor delays if the CNAME's cache expires before the target's. Some DNS providers, such as and AWS Route 53, implement proprietary features like CNAME flattening to simulate apex CNAME functionality by internally resolving the alias to an at query time, bypassing standard DNS restrictions. These workarounds are not part of the DNS standards and may vary in behavior across providers. CNAME records interact similarly with AAAA records as with IPv4 A records, subject to the same coexistence prohibitions, though resolvers must chain the alias appropriately during queries for either address type.

Frequent Confusions and Pitfalls

A common misunderstanding about CNAME records is that they directly resolve to es like A or records, whereas in reality, a CNAME merely aliases one domain name to another, necessitating an additional DNS lookup to obtain the final . This indirection inherently introduces extra compared to direct A record resolutions, as the resolver must perform a subsequent query for the target name's records. Another frequent pitfall involves creating circular chains of CNAME records, such as alias1 pointing to alias2 and alias2 pointing back to alias1, which triggers resolution failure due to infinite loops that exhaust resolver resources or hit query limits. DNS resolvers are required to detect and terminate such loops to prevent endless , often resulting in errors like SERVFAIL. Tools like DNSViz can visualize and identify these circular dependencies during zone analysis. A prevalent configuration error is attempting to use a CNAME record at the domain apex (root zone), which is prohibited because a CNAME cannot coexist with other mandatory records like SOA or at the same name, leading to incomplete responses or NXDOMAIN errors for affected queries. This issue is particularly problematic for email services, as records must point directly to a and cannot reference a CNAME alias, causing delivery failures if chains are involved. In environments, CNAME mismatches—where the alias name does not match the certificate's —can disrupt enforcement, as browsers may reject connections due to invalid certificates while still applying strict upgrades, potentially breaking site access or exposing users to errors. Additionally, CNAME cloaking, which disguises malicious third-party domains as legitimate aliases, poses a security risk by facilitating attacks that evade detection through apparent first-party resolutions.

DNAME Record

The DNAME (Delegation Name) record, designated as DNS resource record type 39, enables the mapping of an entire domain subtree to another domain by rewriting the query suffix during DNS resolution. For example, a DNAME record for "" pointing to "target.com" would redirect queries for "sub." to "sub.target.com", effectively aliasing all subdomains without requiring individual records. This mechanism supports scalable delegation of zones or subzones, particularly in scenarios where an wishes to redirect an entire to a hosted . DNAME was initially specified in RFC 2672, published in 1999, which introduced it as an experimental extension to the DNS protocol for handling domain name substitutions. However, due to implementation issues and ambiguities in delegation handling, RFC 2672 was obsoleted by RFC 6672 in 2012, which refined the specification to clarify query rewriting, error conditions, and compatibility with existing DNS resolvers. The updated standard emphasizes DNAME's role in simplifying administrative tasks, such as migrating subdomains en masse, while ensuring that responses remain compliant with DNS message formats. During DNS , a DNAME triggers the authoritative to synthesize a response that appends the queried to the target domain, mimicking the behavior of a CNAME but applying it recursively to the full query path. This synthesis occurs transparently to the client, allowing resolvers to follow the chain to the final A or records without explicit wildcard entries. As a result, DNAME is particularly useful for zone delegation in or content delivery networks, where maintaining per-subdomain aliases would be impractical. In contrast to the CNAME record, which provides point-to-point for a single name and cannot coexist with other record types at the same node, DNAME operates at the domain level to handle wildcards and arbitrary subdomains efficiently. While modern DNS resolvers, such as those in and Unbound, support DNAME processing, its adoption remains limited due to historical concerns and the prevalence of alternative methods like records. Sparse deployment is evident in production zones, where DNAME is primarily used in controlled environments rather than general-purpose .

Alias Records (ANAME/FLATTEN)

Alias records, also known as ANAME or ALIAS records, are non-standard DNS extensions developed by various providers to enable CNAME-like at the () of a , where standard CNAME records are prohibited due to conflicts with required SOA and records. These proprietary mechanisms allow domain administrators to point the to another without violating DNS specifications, by dynamically resolving the target to A or AAAA records at query time rather than returning a CNAME. Introduced in the early amid rising adoption, alias records address the limitations of traditional DNS for services like content delivery networks (CDNs) and load balancers, which often require flexible at root domains. For example, Cloudflare's CNAME flattening, launched in 2014, permits CNAME records at the zone apex by synthesizing IP addresses from the target's resolution during DNS queries, ensuring resolvers receive compliant A/AAAA responses. This approach not only emulates but also accelerates resolution by eliminating an extra lookup step, while supporting features like geo-routing through Cloudflare's network. Amazon Web Services (AWS) Route 53 employs alias records specifically for routing to AWS resources, such as Load Balancers or CloudFront distributions, at the apex without exposing CNAME chains. When queried, Route 53 resolves the aliased resource internally and returns the corresponding addresses, maintaining low and enabling health checks or failover routing that standard CNAMEs cannot provide at the root. Similarly, DNSimple's ALIAS record, introduced in 2011, functions as a virtual type that translates to A/AAAA records on-the-fly, allowing coexistence with other record types like or at the same name, unlike CNAMEs. DNS Made Easy's ANAME records operate analogously, providing root-level aliasing with faster propagation since they avoid CNAME indirection. These extensions are not part of official DNS standards, as the IETF has historically discouraged apex aliasing to preserve zone integrity, though draft proposals like draft-sury-dnsext-cname-at-apex explored standardization without adoption. Adoption surged in the 2010s with cloud providers, enabling seamless integration for apex domains in distributed systems, but they remain vendor-specific and incompatible with zone transfers to secondary servers that do not support the same flattening logic.

References

  1. [1]
    RFC 1035 - Domain names - implementation and specification
    This RFC describes the details of the domain system and protocol, and assumes that the reader is familiar with the concepts discussed in a companion RFC.
  2. [2]
    Supported DNS record types - Amazon Route 53
    A CNAME record maps DNS queries for the name of the current record, such as acme.example.com, to another domain (example.com or example.net) or subdomain (acme.<|control11|><|separator|>
  3. [3]
    RFC 2181 - Clarifications to the DNS Specification - IETF Datatracker
    This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the ...
  4. [4]
  5. [5]
    RFC 952 - DoD Internet host table specification - IETF Datatracker
    This RFC is the official specification of the format of the Internet Host Table. This edition of the specification includes minor revisions to RFC-810 which ...
  6. [6]
  7. [7]
  8. [8]
    RFC 4033 - DNS Security Introduction and Requirements
    The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.
  9. [9]
  10. [10]
    Resolving records through more than 8 CNAME fails due to ... - GitHub
    Mar 2, 2021 · I've run into an edge case where a name passed through 9 CNAMEs (and 10 total resolutions to get the final answer).
  11. [11]
    tsuNAME: DNS loops are a well-known problem, but aren't properly ...
    Dec 21, 2021 · In short, RFC 1034, RFC 1035 and RFC 1536 describe the problem and do provide guidance to resolver implementers to help avoid infinite loops ...
  12. [12]
  13. [13]
  14. [14]
    What is a DNS CNAME record? - Cloudflare
    A "canonical name" (CNAME) record points from an alias domain to a "canonical" domain. A CNAME record is used in lieu of an A record, when a domain or subdomain ...
  15. [15]
    About CNAME records - Google Workspace Admin Help
    CNAME records are typically used to map a subdomain such as www or mail to the domain hosting that subdomain's content.Missing: common | Show results with:common
  16. [16]
    What is a CNAME (Canonical Name) Record? - IBM
    Common use cases include: · Pointing a hostname for network services such as email, FTP, or CDNs (content delivery networks) to the root domain name (the “true ...
  17. [17]
    Use custom URLs by adding alternate domain names (CNAMEs)
    When you add alternate domain names, you must create CNAME records to route DNS queries for the alternate domain names to your CloudFront distribution. To do ...Routing traffic to an Amazon... · Move an alternate domain nameMissing: common | Show results with:common<|control11|><|separator|>
  18. [18]
    CNAME Records Common Use Cases and Benefits - DigiCert
    May 1, 2023 · A CNAME record is a type of DNS resource record that maps one domain name to another. CNAME records allow you to create an alias for a domain name.
  19. [19]
    What Is a DNS CNAME Record? - BlueCat Networks
    Jul 17, 2025 · A DNS CNAME record is ideal in scenarios where you want one domain name to serve as an alias for another. This helps simplify DNS management and ...What Is A Dns Cname Record? · How Does A Dns Cname Record... · When To Use A Cname Record
  20. [20]
    Google Workspace DNS - DreamHost Knowledge Base
    DreamHost creates a custom CNAME for the 'mail' subdomain that points to ghs.googlehosted.com. TXT verification. DreamHost uses the method of creating a TXT ...
  21. [21]
    Add a CNAME record to your domain's DNS records - Google Help
    Go to your domain's DNS records. Add a record to your DNS settings, selecting CNAME as the record type. Return to the first window or tab and copy the contents.
  22. [22]
    Working with CNAME records and your DNS provider - Fastly
    Using an incorrect value may cause HTTPS (port 443) visitors to receive a TLS certificate mismatch error. The format for the CNAME record value is <letter>.sni.
  23. [23]
    What is Anycast DNS? | How Anycast works with DNS - Cloudflare
    Learn how Anycast makes DNS resolving faster, increases reliability, and prevents DNS flood DDoS attacks.
  24. [24]
    What is DNS Failover? - CloudfloorDNS
    Dec 13, 2021 · DNS Failover is a cloud-based service that leverages remote monitoring coupled with Anycast DNS services. It's designed to add uptime and prevent outages.
  25. [25]
    Custom domain name for public REST APIs in API Gateway
    With custom domain names, you can set up your API's hostname, and choose a base path (for example, myservice) to map the alternative URL to your API.
  26. [26]
    Implementing custom domain names for private endpoints with ...
    Nov 21, 2024 · You can use custom domain names to map to private REST APIs and share those custom domain names across accounts using AWS Resource Access Manager (AWS RAM).Overview Of Api Gateway... · Calling Private Rest Api... · Step 1: Creating A Private...
  27. [27]
    Using API Gateway as a Single Entry Point for Web Applications and ...
    Oct 22, 2019 · AWS has also made it seamless to adopt microservices architectures ... CNAME records for example customer1.example.com, customer2.example ...
  28. [28]
    3. Configurations and Zone Files
    BIND 9 uses a single configuration file called named.conf. which is typically located in either /etc/namedb or /usr/local/etc/namedb.
  29. [29]
    ChangeResourceRecordSets - Amazon Route 53
    To create resource record sets for complex routing configurations, use either the traffic flow visual editor in the Route 53 console or the API actions for ...
  30. [30]
  31. [31]
    Add-DnsServerResourceRecordCName (DnsServer) | Microsoft Learn
    Examples. Example 1: Add a CNAME resource record. Copy. PS C:\> Add-DnsServerResourceRecordCName -Name "labsrv1" -HostNameAlias "srv1.lab.contoso.com ...Syntax · Default (Default) · DescriptionMissing: docs | Show results with:docs
  32. [32]
  33. [33]
    Dig Command in Linux (DNS Lookup)
    Feb 26, 2020 · Querying CNAME records #. To find the alias domain name use the cname option: dig +nocmd mail.google.com cname +noall +answer. Copy mail ...Understanding the dig Output · Query Specific Name Server · Query a Record Type
  34. [34]
  35. [35]
  36. [36]
  37. [37]
    Are CNAMES slow? - Stack Overflow
    Apr 14, 2009 · Using a CNAME should only cause very minimal additional DNS resolution delay, and only if the result is not already in the recursive DNS server's cache.
  38. [38]
    CNAME flattening | Managed Hosting for WooCommerce - GoDaddy
    In the simplest terms, CNAME flattening is a DNS feature that allows you to point the root of your domain to a CNAME, rather than an IP address.
  39. [39]
    Edge DNS: Zone Apex Mapping & DNSSEC - Akamai
    Aug 19, 2019 · While this is a common setup, this layer 7 redirect and subsequent CNAME lookup can add latency to a user's web experience. In addition, this ...
  40. [40]
    DNSViz | A DNS visualization tool
    DNSViz is a tool for visualizing the status of a DNS zone. It was designed as a resource for understanding and troubleshooting deployment of the DNS Security ...Missing: CNAME circular
  41. [41]
    Using CNAME records to redirect to HTTPS when HSTS is active
    Oct 30, 2017 · The problem now is that users enter http://www.abc.example.com and get redirected to https://www.abc.example.com , instead of https://abc.HSTS header causes problems for CNAME records? - Server FaultSSL Certificate for host poiting to CNAME - Server FaultMore results from serverfault.com
  42. [42]
    CNAME Cloaking: Disguising Third Parties Through the DNS
    Oct 24, 2022 · CNAME cloaking leverages the Domain Name System (DNS) to hide when a browser is sending information to a domain controlled by a third party.Executive Summary · What Is CNAME Cloaking? · CNAME Cloaking Detections...
  43. [43]
    What Is an ALIAS Record? - DNSimple Help
    An ALIAS record is a unique, virtual record type developed by DNSimple to address a specific challenge in DNS management: providing CNAME-like behavior for apex ...
  44. [44]
    Introducing CNAME Flattening: RFC-Compliant CNAMEs at a ...
    Apr 3, 2014 · A CNAME is an alias. It allows one domain to point to another domain which, eventually if you follow the CNAME chain, will resolve to an A ...
  45. [45]
    CNAME flattening - DNS - Cloudflare Docs
    Aug 20, 2025 · CNAME flattening speeds up CNAME resolution and allows you to use a CNAME record at your zone apex (example.com).Missing: latency | Show results with:latency
  46. [46]
    Choosing between alias and non-alias records - Amazon Route 53
    Alias records let you route traffic to selected AWS resources, including but not limited to, CloudFront distributions and Amazon S3 buckets.
  47. [47]
    What is an ANAME Record? - DNS Made Easy
    May 16, 2024 · ANAME Records Explained. Simply put, an ANAME record is a record that performs like a CNAME record but can be pointed at the root of a domain.Ready to Get Started? · ANAME Records Explained · How ANAME Records WorkMissing: standard | Show results with:standard
  48. [48]
    CNAME at the zone apex draft-sury-dnsext-cname-at-apex-00 - IETF
    This document proposes a modification to CNAME record to coexist with SOA and NS records at the zone apex. This proposal will improve aliasing in the DNS system ...Missing: prohibited | Show results with:prohibited
  49. [49]
    How ALIAS Records Resolve with Secondary DNS - DNSimple Help
    Oct 23, 2025 · DNSimple's ALIAS records provide dynamic resolution for your apex domains, a feature unique to our platform. When you use secondary DNS servers ...