skip to main content
10.1145/1016687.1016695acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Is your caching resolver polluting the internet?

Published:03 September 2004Publication History

ABSTRACT

Previous research has shown that most of the DNS queries reaching the root of the hierarchy are bogus [1]. This behavior derives from two constraints on the system: (1) queries that cannot be satisfied locally percolate up to the root of the DNS; (2) some caching nameservers are behind packet filters or firewalls that allow outgoing queries but block incoming replies. These resolvers assume the network failure is temporary and retransmit their queries, often aggressively.DNS pollution may not be causing any perceivable performance problems. The root servers seem well equipped to handle the load. Since DNS messages are small, the pollution does not contribute significantly to the total traffic generated by most organizations. Nonetheless, this paper provides a few reasons why network operators should take the time to investigate and fix these problems.

References

  1. Duane Wessels and Marina Fomenkov, "Wow, That's a Lot of Packets," in Proc. 2003 Passive and Active Measurements Workshop, April 2003.]]Google ScholarGoogle Scholar
  2. P. B. Danzig, K. Obraczka, and A. Kumar, "An Analysis of Wide-Area Name Server Traffic," ACM Comp. Commun. Review (SIGCOMM'92), Conference Proc., vol. 22, 4, pp. 281--292, 1992, http://catarina.usc.edu/kobraczk/dns.ps.Z.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Evi Nemeth, k claffy, and Nevil Brownlee, "DNS Measurements at a Root Server," in Proc. IEEE Globecom, 2001.]]Google ScholarGoogle Scholar
  4. Duane Wessels, Marina Fomenkov, and Nevil Brownlee, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy," in Proc. 2004 Passive and Active Measurements Workshop, April 2004.]]Google ScholarGoogle Scholar
  5. Joe Abley, "Hierarchical Anycast for Global Service Distribution," 2003.]]Google ScholarGoogle Scholar
  6. Daniel J. Bernstein, "djbdns," June 2003, http://cr.yp.to/djbdns.html.]]Google ScholarGoogle Scholar
  7. Y. Rekhter, B. Moskowitz, D. Karrenber, G. J. de Groot, and E. Lear, "RFC 1918: Address Allocation for Private Internets," February 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. "The AS 112 Pro ject," http://www.as112.net.]]Google ScholarGoogle Scholar
  9. Mark Andrews, "Negative Caching of DNS Queries (DNS NCACHE)," March 1998, Request For Comments 2038.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Internet Software Consortium, "Berkeley Internet Name Domain (BIND) website," http://www.isc.org/sw/bind/.]]Google ScholarGoogle Scholar
  11. Paul Albitz and Cricket Liu, DNS and BIND, O'Reilly and Associates, 4th edition, April 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Duane Wessels, "dnstop," http://dnstop.measurement- factory.com.]]Google ScholarGoogle Scholar
  13. John Strang, Programming With Curses, O'Reilly and Associates, January 1986.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Vixie, S. Thompson, Y. Rekhter, and J. Bound, "Dynamic Updates in the Domain Name System (DNS UPDATE)," April 1997, Request For Comments 2136.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Mockapetris, "Domain Names--Concepts and Facilities," November 1987, Internet Standard 0013 (RFCs 1034, 1035).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Jung, E. Sit, H. Balakrishnan, and R. Morris, "DNS Performance and the Effectiveness of Caching," 2001, http://www.sds.lcs.mit.edu/papers/dns-imw2001.html]]Google ScholarGoogle Scholar

Index Terms

  1. Is your caching resolver polluting the internet?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      NetT '04: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality
      September 2004
      326 pages
      ISBN:158113942X
      DOI:10.1145/1016687

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 September 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader