Characterizing Anycast in the Domain Name System

نویسندگان

  • Xun Fan
  • John Heidemann
  • Ramesh Govindan
چکیده

IP anycast is a central part of production DNS. While prior work has explored proximity, affinity and load balancing for some anycast services, there has been little attention to third-party discovery and enumeration of components of an anycast service. Enumeration can reveal abnormal service configurations, benign masquerading or hostile hijacking of anycast services, and can help characterize the extent of anycast deployment. In this paper, we discuss two methods to identify and characterize anycast nodes. The first uses an existing anycast diagnosis method based on CHAOS-class DNS records but augments it with traceroute to resolve ambiguities. The second proposes Internet-class DNS records which permit accurate discovery through the use of existing recursive DNS infrastructure. We validate these two methods against three widely-used anycast DNS services, using a very large number (60k and 300k) of vantage points, and show that they can provide excellent precision and recall. Finally, we use these methods to evaluate anycast deployments in top-level domains (TLDs), and find one case where a third-party operates a server masquerading as a root DNS anycast node as well as a noticeable proportion of unusual anycast proxies. We also show that, across all TLDs, up to 72% use anycast, and that, of about 30 anycast providers, the two largest serve nearly half the anycasted TLD name-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying and Characterizing Anycast in the Domain Name System

Since its first appearance, IP anycast has become essential for critical network services such as the Domain Name System (DNS). Despite this, there has been little attention to independently identifying and characterizing anycast nodes. External evaluation of anycast allows both third-party auditing of its benefits, and is essential to discovering benign masquerading or hostile hijacking of any...

متن کامل

Query / Response Cycle Application Client Anycast Domain Name Specification Client Filter IP Address Anycast Server Filter Anycast Group Response Metric Info Query Anycast Anycast Resolver

Server replication is a key approach for maintaining user-perceived quality of service within a geographically widespread network. The anycasting communication paradigm is designed to support server replication by allowing applications to easily select and communicate with the \best" server, according to some performance or policy criteria, in a group of content-equivalent servers. We examine t...

متن کامل

Application Client Anycast Domain Name Specification Client Filter IP Address Anycast Server Filter Anycast Group Response Metric Info Query Anycast Anycast Resolver Filter

The anycasting communication paradigm is designed to support server replication by allowing applications to easily select and communicate with the \best" server, according to some performance or policy criteria, in a group of content-equivalent servers. We examine the deenition and support of the anycasting paradigm at the application layer, providing a service that maps anycast domain names in...

متن کامل

Recursives in the Wild : Engineering Authoritative DNS Servers ( extended ) ISI - TR - 720 1 June 2017

In Internet Domain Name System (DNS), services operate authoritative name servers that individuals query through recursive resolvers. Operators strive to provide reliability by operating multiple name servers (NS), each on a separate IP address, and by using IP anycast to allow NSes to provide service from many physical locations. To meet their goals of minimizing latency and balancing load acr...

متن کامل

The Case for Pushing DNS

The Domain Name System (DNS, [2]) has long been a critical part of the Internet infrastructure. The successful Denial-of-Service (DoS) attacks against Microsoft’s DNS servers in 2001 and the unsuccessful DoS attacks on the root name servers in 2002 have raised concerns about the vulnerability of the DNS. Operators responded by hardening the infrastructure, and using BGP anycast to replicate the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011