The Survey Report on DNS Cache & Recursive Service in China Mainland



Similar documents
Understanding DNS (the Domain Name System)

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

State of the Cloud DNS Report

State of the Cloud DNS Report

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

Testing & Assuring Mobile End User Experience Before Production. Neotys

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

DNS traffic analysis -- Issues of IPv6 and CDN --

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Web Caching and CDNs. Aditya Akella

DNS and BIND. David White

The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. Duisburg, June 19, 2015

Making the Internet fast, reliable and secure. DE-CIX Customer Summit Steven Schecter <schecter@akamai.com>

Use Domain Name System and IP Version 6

Global Server Load Balancing

DNS at NLnet Labs. Matthijs Mekking

Domain Name Service (DNS) Training Division, NIC New Delhi

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

FortiBalancer: Global Server Load Balancing WHITE PAPER

High-Performance DNS Services in BIG-IP Version 11

The story of dnsdist - or - Do we need a DNS Delivery Controller?

Windows 2008 Server. Domain Name System Administración SSII

John S. Otto Fabián E. Bustamante

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th

Application-layer protocols

The story of dnsdist - or - Do we need a DNS Delivery Controller?

Computer Networks: Domain Name System

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Global Server Load Balancing

How To Understand The Power Of A Content Delivery Network (Cdn)

INFORMATION SECURITY REVIEW

Teldat Router. DNS Client

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Copyright International Business Machines Corporation All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING

DOMAIN NAME SECURITY EXTENSIONS

Distributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

IPv6 support in the DNS

ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

STATE OF DNS AVAILABILITY REPORT

Public-Root Name Server Operational Requirements

Automatic Configuration of Slave Nameservers (BIND only)

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

Lecture 2 CS An example of a middleware service: DNS Domain Name System

White paper. Reliable and Scalable TETRA networks

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Network Working Group. Category: Standards Track October 2006

The Future of DNS. Johan Ihrén Netnod. October 15,

Networking Domain Name System

Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour

Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015

Network Layers. CSC358 - Introduction to Computer Networks

Best Practices in DNS Anycast Service-Provision Architecture. Version 1.1 March 2006 Bill Woodcock Gaurab Raj Upadhaya Packet Clearing House

An Introduction to the Domain Name System

Introduction to the Domain Name System

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic

ZooKeeper. Table of contents

How To Understand The Power Of Icdn

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

CDN Brokering. Content Distribution Internetworking

Windows Geo-Clustering: SQL Server

DNS Architecture Case Study: Resiliency and Disaster Recovery

Registry Update. John Dickinson. Nominet UK

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Jibe Hub. RCS Exchange for Mobile Operators. The Global Communications Cloud. Anil Sharma Director, Jibe Mobile anil@jibemobile.

Domain Name System (DNS)

The Domain Name System

The Collateral Damage of Internet Censorship by DNS Injection

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

DNS use guidelines in AWS Jan 5, 2015 Version 1.0

FatPipe Networks

LAN TCP/IP and DHCP Setup

Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.

Managing DNS Server Properties

DNSSEC and DNS Proxying

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Transcription:

The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center

Motivation Improve the traditional recursive service model to adapt to new situations: Recursive servers work as the only data provider for end users in the last mile, play an important role in decentralization, localization and scalability of DNS, and should bear more multiple and flexible functions to adapt to the evolution of internet techniques and market. Function extensions promoted by IETF, e.g.: Recursive server loads root zonefile draft-ietf-dnsop-root-loopback-01 Recursive server carries client subnet information draft-ietf-dnsop-edns-client-subnet-00 Recursive server secures the signalings draft-hoffman-dprive-dns-tls-alpn-00 Function modifications driven by market Many companies make use of recursive server to realize special management and business purpose like access control, service schedule, traffic2profit and etc., but regardless of the potential undermining to DNS ecosystem.

China Recursive Service Market Traditional recursive service providers ISP: China Telecom, China Unicom, China Mobile > 90% market share Classical textbookish service model strictly follow RFCs New players and new architecture Alibaba, 114DNS, Qihoo360 Compound system consisted of independent cache subsystem, recursive subsystem and backup subsystem.

The evolution of recursive service Trinity Big Recursive Backup server Stub resolver Online cache Big recursive service Recursive Server Authoritative Server Cache: covering multiple regions (areas), decreasing latency and improving hit ratio by all means, such as Actively initiate queries based on end user behavior estimation Recursive: degenerated into a weak and simple data fetching tool Backup: maintained mainly for emergency cases Backups important zonefiles or TOP-N names beforehand Imports data into Cache or directly works as recursive server in emergency

Merits of new architecture Performance Increases the hit ratio by pre-detection and pre-store mechanism. Security Spreads the risks by separating cache function from recursive. Cache is not exposed to the public, only visible to given end users Emergency response Provides a relatively alternative credible data source in case of emergency. DNSSEC Provides an extra DNSSEC resolution path Most stubs originates non-dnssec requests, but cache administrator would forward them in DNSSEC-enabled form for specified domain names, increasing the integrity of cached data.

Practice in China Telecom Global biggest DNS service provider Cover 100M fixed network users and 200M mobile users Daily DNS queries over 300B ( average 3.5M QPS, peak 8M QPS) 80 backbone DNS service nodes in China 2-4 nodes per province with a standby backup server Every node is consisted of 2 sub-systems: Level1: cache-only system Level2: recursive (forwarding) system Access point: 2-4 DNS servers each city Resolve the queries directly. Forward queries to cache system in the province-level.

Practice in AliDNS Fast growing DNS service provider Cover 70M users in 1 year after published Daily DNS queries over 20B ( average 280k QPS, peak 600k QPS) multi-optimization Friendly with CDN deploying local forwarding recursive agent in different networks and regions support edns-client-subnet cache 10M DNS records pre-fetch before TTL expires 4 Access points 223.5.5.5 223.6.6.6 Anycasting

Practice in 114DNS (114.114.114.114) NS.taobao.com NS.apple.com Recursive Agent Area_1 Cache for Area_1 Cache for Area_2 Cache for Area_X Recursive Agent Area_X Area_1 Check Subscriber s Source IP Address Area_X 114DNS Access Point 3 access point, 56 DNS service areas all over China. About 30,000,000 end users use 114DNS as their primary DNS. Friendly with CDN by deploying local forwarding recursive agent in different networks and regions.

Negative impact to DNS ecosystem The new architecture breaks the balance between stub, recursive and authoritative functions originally designed. Decreases the number of queries arriving at authoritative server. More end users covered by on-line cache server, less queries reach authoritative server. In extremis, the authoritative server get 6 queries during TTL period if all 6 recursive providers share the market. Distorts the query behavior and statistics at authoritative server The packets reach recursive server are not all triggered by stub any more, a high percentage are initiated (forwarded or simulated) by cache administrator. Cut the authoritative queries number to ZERO in emergency Usually activated by local administrator without notifying related authoritative servers. For authoritative, the related area is black-hole from where all queries disappear.

Conclusions The role of recursive server is becoming more important and more complicated with the expansion of DNS tree as well as the whole internet. The market has made the choice. Modification on recursive system is becoming a mainstream solution. The current rough solution brings unexpected problems, undermines the foundation of DNS module. Cooperation mechanism and technical extension between recursive and authoritative is needed.

Some Suggestions Cache & Recursive query packets carry optional information to authoritative, like: Query amount for a given domain name Total number of local stubs Cache initiated or stub initiated Backup server notify authoritative before and after emergency Before: Take-over notification After: Emergency processing statistics report Local shared backup service agent Trusted by multiple recursive operators in a local area High speed data synchronization with authoritative operators IXFR or frequently AXFR

Thanks Q&A Wei WANG: wangwei@cnic.cn Zhiwei YAN: yanzhiwei@cnnic.cn