When running authoritative DNS at scale, managing zone transfers between primary and secondary servers is critical. Zone transfers (AXFR for full transfers, IXFR for incremental updates) ensure DNS records propagate reliably across your infrastructure. This guide compares three battle-tested authoritative DNS servers — BIND 9, PowerDNS, and NSD — to help you choose the right solution for your self-hosted DNS zone management needs.
Why Self-Host Authoritative DNS with Zone Transfers
Running your own authoritative DNS gives you full control over zone data, transfer policies, and update schedules. Whether you’re managing DNS for a corporate network, hosting provider, or multi-region infrastructure, reliable zone transfers are the backbone of DNS availability:
- High availability: Secondary servers take over if the primary fails
- Geographic distribution: Deploy secondaries close to users for lower latency
- Load balancing: Spread query load across multiple authoritative servers
- Data redundancy: Protect against data loss with replicated zones
- Compliance: Keep DNS data on-premises for regulatory requirements
BIND 9 vs PowerDNS vs NSD: Comparison at a Glance
| Feature | BIND 9 | PowerDNS Authoritative | NSD |
|---|---|---|---|
| GitHub Stars | N/A (ISC project) | 4,353 | 544 |
| Last Updated | Active (ISC) | 2026-04-29 | 2026-04-24 |
| Language | C | C++ | C |
| AXFR Support | Yes (primary and secondary) | Yes (primary and secondary) | Yes (secondary only) |
| IXFR Support | Yes | Yes | Yes (secondary only) |
| Multi-Master | Via shared backend | Yes (native with database) | No (primary/secondary only) |
| Database Backend | File-based (zone files) | MySQL, PostgreSQL, SQLite, etc. | File-based (zone files) |
| DNSSEC | Full support | Full support | Full support (NSEC3) |
| Dynamic Updates | Yes (RFC 2136) | Yes | No |
| Web UI | No | Yes (PowerDNS-Admin, others) | No |
| License | MPL 2.0 | GPL-2.0 | BSD-2-Clause |
Key distinction: NSD is designed as a secondary-only authoritative server — it cannot serve as a primary zone master. This makes it ideal for slave deployments but unsuitable if you need a single-server authoritative setup.
BIND 9: The Reference Implementation
BIND 9 (Berkeley Internet Name Domain) is the most widely deployed DNS server software, maintained by the Internet Systems Consortium (ISC). It has been the reference implementation of DNS protocols for decades.
AXFR/IXFR Configuration
BIND 9 supports both full (AXFR) and incremental (IXFR) zone transfers natively:
| |
Docker Deployment
| |
Secondary Server Setup
| |
Strengths
- Protocol compliance: BIND is the reference implementation — if a DNS RFC exists, BIND supports it
- Dynamic DNS updates: Accepts RFC 2136 dynamic updates, useful for DHCP integration
- Mature ecosystem: Decades of hardening, extensive documentation, and community knowledge
- View support: Serve different zone data to different clients (split-horizon DNS)
Weaknesses
- Complex configuration: Steep learning curve for new administrators
- File-based zones: Zone transfers can be slow for very large zones compared to database backends
- Resource-heavy: Higher memory footprint compared to NSD
PowerDNS Authoritative: Database-Driven DNS
PowerDNS Authoritative Server is a high-performance DNS server with a unique architecture — it stores zone data in databases rather than flat files. This enables powerful features like multi-master replication and real-time zone updates.
Native Multi-Master Zone Replication
Unlike BIND and NSD, PowerDNS supports true multi-master setups when using a shared database backend:
| |
IXFR and Zone Transfer Configuration
| |
Docker Compose with MySQL Backend
| |
PowerDNS API for Zone Management
PowerDNS exposes a REST API for zone management, enabling automation:
| |
Strengths
- Database backend: MySQL, PostgreSQL, SQLite — enables multi-master replication
- REST API: Programmatic zone management without reloading
- Web interfaces: PowerDNS-Admin, PowerDNS-AdminUI provide GUI management
- Live reload: Zone changes propagate without server restart
- GeoIP routing: Serve different records based on client location
Weaknesses
- Database dependency: Requires a database server — additional infrastructure to maintain
- Secondary-only mode: Some features require database backend even for secondary servers
- Learning curve: Different mental model from traditional zone-file DNS
NSD: Lightweight Secondary DNS
NSD (Name Server Daemon), developed by NLnet Labs, is a fast, lean authoritative DNS server optimized for secondary/slave deployments. It intentionally does not support primary/master mode — it only serves zones received via zone transfer.
NSD Secondary Configuration
| |
Docker Deployment
| |
Primary Server Zone Transfer Configuration (BIND as primary, NSD as secondary)
| |
Strengths
- Lightweight: Minimal memory footprint, ideal for dedicated secondary servers
- Fast: Optimized query response times — one of the fastest authoritative servers
- Secure by design: No primary mode means reduced attack surface
- Simple configuration: Straightforward zone file-based setup
- BSD license: Permissive licensing for commercial deployments
Weaknesses
- Secondary only: Cannot operate as a primary/master DNS server
- No dynamic updates: Does not support RFC 2136 dynamic DNS updates
- File-based zones: Zone data stored in files, no database backend option
- No web UI: Configuration is entirely file-based
Zone Transfer Best Practices
1. Use TSIG Authentication
Always secure zone transfers with TSIG (Transaction SIGnature) keys to prevent unauthorized zone data access:
| |
2. Configure AXFR and IXFR Appropriately
- AXFR transfers the entire zone — suitable for initial sync or small zones
- IXFR transfers only changed records — essential for large zones with frequent updates
- Set appropriate
serialincrement policies in zone files (use SOA serial formatYYYYMMDDNN)
3. Monitor Zone Transfer Health
| |
4. Implement NOTIFY for Fast Propagation
Configure notify yes on primary servers to immediately alert secondaries of zone changes, rather than waiting for the SOA refresh interval.
When to Choose Each Server
| Scenario | Recommended Server |
|---|---|
| Traditional primary/secondary with zone files | BIND 9 |
| Multi-master with database backend | PowerDNS Authoritative |
| Dedicated lightweight secondary server | NSD |
| Dynamic DNS updates needed | BIND 9 or PowerDNS |
| REST API for automation | PowerDNS |
| Minimal resource footprint | NSD |
| Split-horizon / views | BIND 9 |
| Web UI management | PowerDNS |
For most organizations, a hybrid approach works best: BIND 9 or PowerDNS as the primary master, with NSD secondaries handling query load at edge locations.
FAQ
What is the difference between AXFR and IXFR?
AXFR (full zone transfer) sends the entire zone file from the primary to secondary server. IXFR (incremental zone transfer) only sends the records that have changed since the last transfer. IXFR is significantly faster for large zones with infrequent updates, while AXFR is used for initial synchronization or when IXFR is not supported.
Can NSD be used as a primary DNS server?
No. NSD is intentionally designed as a secondary-only authoritative server. It cannot create or serve zones from its own zone files — it only serves zones received via AXFR/IXFR from a primary server. If you need a primary server, use BIND 9 or PowerDNS Authoritative instead.
How do I secure zone transfers between DNS servers?
Use TSIG (Transaction SIGnature) keys to authenticate zone transfer requests. Both BIND 9 and PowerDNS support TSIG with HMAC-SHA256. Generate a shared secret key on the primary, configure it in both primary and secondary server configs, and restrict allow-transfer to only the IP addresses of your secondary servers.
Does PowerDNS support multi-master DNS setups?
Yes. When using a shared database backend (MySQL, PostgreSQL), multiple PowerDNS Authoritative instances can write to the same database simultaneously. This provides true multi-master replication where any server can update zone data and changes are immediately visible to all instances — no zone transfers needed.
How often do DNS zone transfers occur?
Zone transfers are triggered by two mechanisms: (1) NOTIFY messages from the primary when a zone changes (immediate), and (2) SOA refresh intervals when secondaries check if the serial has increased (periodic, typically every 1-24 hours). For fast propagation, configure notify yes on the primary and keep SOA refresh intervals short.
Which DNS server is fastest for query responses?
NSD is generally the fastest for authoritative query responses due to its minimal design and optimized data structures. PowerDNS is also very fast, especially with in-memory database caching. BIND 9 is slightly slower but offers the most features and protocol compliance.