DNS Measurement at a Root Server Presented by Zhengxiang Pan

advertisement
DNS Measurement at a Root
Server
Nevil Brownlee, kc Claffy and Evi Nemeth
Presented by Zhengxiang Pan
Mar. 27th, 2003
Introduction
• DNS: Domain Name System
• BIND: Berkeley Internet Name Domain
System
Local Name Server
UDP
client
Local Name Server
Local Name Server
Root Server
Methodology
Passive capture DNS packets at F.root-server.net
Use Tcpdump
& Error logs
Results
• A. query rate
• Responds 93% of the input packets.
Error taxonomy
• B1. Repeated queries
– Maybe the results of a broken nameserver or a
broken client.
• B2. Private Address Space
– About 7% of the queries are asking for hostname
associated with an RFC 1918 address.
– 2% - 3% of the queries have the source IP address in
RFC 1918 space.
Error taxonomy
• B3. Top Level Domains
– In 1 hour trace of Jan. 7, 2001:
– 16.5% of the servers asked only INVALID TLD
– 37.1% of the servers asked at least one INVALID TLD
Error taxonomy
• B4. Bogus A Queries
– A query: hostname  IP address
– 12-18% A queries target IP address
• B5. Source Port Zero
– Port 0 is reserved and not valid in UDP / TCP.
– Root servers never answer queries from port 0
Error Taxonomy
• B6. Dynamic Updates
– DHCP can dynamic update local nameserver, should
not try to update root servers.
Results
• Attacks
– Spoofing source IP, using root server as
reflector, flooding the attack target with
answers it did not ask.
– Scanning IP space.
• Microsoft’s DNS woes
– Jan. 24, 2001 Microsoft nameserves down,
query load for Microsoft names go to over
25% of the total query load.
Summary
• Percentages of servers have bad
behaviors:
– 13% bogus A query
– 35% invalid TLD
– 35% leaking internal information
• Strategy
– Diagnose and repair bugs in implementation
– Deploy negative answers
Download