Effect of anycast on K-root



Similar documents
Firewall Firewall August, 2003

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Security Toolsets for ISP Defense

BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th

Best Practices in DNS Anycast Service-Provision Architecture. Version 1.1 March 2006 Bill Woodcock Gaurab Raj Upadhaya Packet Clearing House

F root anycast: What, why and how. João Damas ISC

Data Center Content Delivery Network

What communication protocols are used to discover Tesira servers on a network?

Internet Infrastructure Measurement: Challenges and Tools

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Flow Analysis Versus Packet Analysis. What Should You Choose?

Web Caching and CDNs. Aditya Akella

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

Global Server Load Balancing (GSLB) Concepts

DNS Best Practices. Mike Jager Network Startup Resource Center

The Bomgar Appliance in the Network

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

IPV6 SERVICES DEPLOYMENT

Building Nameserver Clusters with Free Software

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

SERVICE DESCRIPTION INTERNET TRANSIT / 2.6.4

An Introduction to Syslog. Rainer Gerhards Adiscon

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

Support Guide: Managing the Subject machine s Firewall.

Content Delivery Networks

JPNIC Public Forum. Paul Vixie. Chairman, Internet Software Consortium. January 21, 2003

The Value of Flow Data for Peering Decisions

K-Root Name Server Operations

DDoS attacks in CESNET2

NAT and Firewall Traversal with STUN / TURN / ICE

How to Make Your IDS Useful. Joel M Snyder Senior Partner Opus One jms@opus1.com

Savvius Insight Initial Configuration

Building a small Data Centre

Chapter 11 Cloud Application Development

Guideline for setting up a functional VPN

Load balancing and traffic control in BGP

Scalable Linux Clusters with LVS

VPN Lesson 2: VPN Implementation. Summary

Installation of the On Site Server (OSS)

Radware s Attack Mitigation Solution On-line Business Protection

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

How to Configure an Initial Installation of the VMware ESXi Hypervisor

BGP and Traffic Engineering with Akamai. Christian Kaufmann Akamai Technologies MENOG 14

DDoS Mitigation Techniques

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Strategies to Protect Against Distributed Denial of Service (DD

VXLAN: Scaling Data Center Capacity. White Paper

Chapter 8 Router and Network Management

Internet Exchange Points (IXPs) Scalable Infrastructure Workshop

Anycast Rou,ng: Local Delivery. Tom Daly, CTO h<p://dyn.com Up,me is the Bo<om Line

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

Outline. Outline. Outline

Appendix D Firewall Log Formats

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

A Plan for the Continued Development of the DNS Statistics Collector

Network setup and troubleshooting

Configuring IP Addressing and Services

Advanced Computer Networks. Layer-7-Switching and Loadbalancing

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

How to launch and defend against a DDoS

allow all such packets? While outgoing communications request information from a

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

Technical Note. ForeScout CounterACT: Virtual Firewall

CS335 Sample Questions for Exam #2

What network engineers can learn from web developers when thinking SDN.

THE UNIVERSITY OF AUCKLAND

Firewall implementation and testing

Use Domain Name System and IP Version 6

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Best Practices for Controlling Skype within the Enterprise > White Paper

Security of IPv6 and DNSSEC for penetration testers

Source-Connect Network Configuration Last updated May 2009

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Regional cyber security considerations for network operations. Eric Osterweil Principal Scientist, Verisign

Advanced BGP Policy. Advanced Topics

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

About Firewall Protection

Load balancing and traffic control in BGP

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Network Layers. CSC358 - Introduction to Computer Networks

CSCE 465 Computer & Network Security

Quality of Service and Denial of Service

Network Security CS 192

Firewalls and Intrusion Detection

Transcription:

Effect of anycast on K-root Some early results 1

K root anycast deployment 3 global nodes (BGP transit) LINX... 5459 25152 25152 i AMS-IX... 25152 25152 25152 i Tokyo (since 5/2005)... 25152 25152 25152 25152 i ~10 local nodes (announced with no-export) Future nodes will be global Miami (live as we speak?) India West coast? 2

Node structure 2 machines running nsd, switches, routers Production IP: OSPF load balancing K-root IP address: 193.0.14.129 Service interfaces Normally firewalled, don t reply to queries LINX: 193.0.16.1, 193.0.16.2 AMS-IX: 193.0.17.1, 193.0.17.2... Management interfaces,... 3

Why anycast? Reasons for anycasting: Provide resiliency and stability Reduce latency Spread server and network load, contain DOS attacks... Is it effective? 4

Latency 5

Latency comparison Ideally, BGP should choose the instance with the lowest RTT. Does it? Measure RTTs from the Internet to: Anycasted IP address (193.0.14.129) Service interfaces of global nodes (not anycasted) Compare results Just to make sure this is apples to apples: Are AS-paths to service interfaces the same as to production IP? According to the RIS, mostly yes 6

Probe locations: TTM (bias?) 7

Method Send DNS queries from all test-boxes For each K-root IP: Do a dig hostname.bind Extract RTT Take minimum value of 5 queries Compare results of anycast IP with those of service interfaces α = RTT K / min(rtt i ) α 1: BGP picks the right node α > 1: BGP picks the wrong node α < 1: local node? 8

Latency comparison Local nodes: = better RTT = worse RTT 9

Local worse than global? $ cat tt89 193.0.14.129 k2.denic 29 k2.denic 30 k2.denic 29 k2.denic 30 k2.denic 29 193.0.16.1 k1.linx 4 k1.linx 3 k1.linx 3 k1.linx 3 k1.linx 3 193.0.16.2 k2.linx 3 k2.linx 3 k2.linx 3 k2.linx 3 k2.linx 4 193.0.17.1 k1.ams-ix 12 k1.ams-ix 11 k1.ams-ix 12 k1.ams-ix 13 k1.ams-ix 13 193.0.17.2 k2.ams-ix 12 k2.ams-ix 13 k2.ams-ix 11 k2.ams-ix 12 k2.ams-ix 13 (This example has since been fixed) What s going on here? Perhaps: Local node announcements don t necessarily leak But they do get announced to customers and customers of customers where they compete with announcements from global nodes which lose out due to prepending 10

Latency comparison (global) 11

Latency: conclusions Local nodes confuse the situation due to transit and prepending But all in all, BGP does a surprisingly good job Even though the AS-paths are of different lengths! This contrasts with other work (Ballani & Francis) Perhaps it is because K only has two global nodes Will it get worse when more nodes are deployed? 12

Load balancing 13

Usefulness of local nodes How much traffic does a local node get? Do local nodes take load off the global nodes? Where do local queries come from? From the global K nodes? From the other root servers? 14

Local queries 15

Local queries (cumulative) 16

Local vs global ~23% 17

Load balancing: conclusions The traffic a local node gets depends on where it is Wide variation Location must be chosen carefully to maximise usefulness Local nodes do take load off the global nodes but not much Increase in local traffic does not correspond to decrease in global traffic Traffic mostly seems to come from the other roots 18

Stability 19

Instance switches Didn t measure resiliency Pretty much a given: the more servers there are, the more they can withstand the more localised the impact of an attack What about stability? The more routes competing in BGP, the more churn Doesn t matter for single-packet exchanges (UDP) Does matter for TCP queries How frequent are instance switches? 20

Detecting instance switches Measure at the server Look at instance switches that actually occur Procedure: Look at packet dumps At the time, there were only 2 global nodes Extract all port 53/UDP traffic For each IP address, remember where it was last seen If the same IP is seen elsewhere, log a switch Caveats: K nodes are only NTP synchronized 21

Instance switches: results 24 hours of data: 527,376,619 queries 30,993 instance switches (~0.006%) 884,010 IP s seen 10,557 switching IPs (~1.1%) What do the switches look like? 22

Time since last switch 23

Time since last switch, log-log 24

Top switching IPs 25

Stability: results Instance switches are rare Some IPs switch a lot Load balancing? Nice power laws, but what do they mean? We don t know yet Further analysis needed 26

Questions? 27