skip to main content
10.1145/3630590.3630595acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment

Published:12 December 2023Publication History

ABSTRACT

Reverse DNS (rDNS) is often used as a reliable data-source for critical services, such as mail, security appliances or geolocation services. Unlike forward DNS, rDNS remains understudied, especially from a deployment perspective. In this paper, we take steps towards closing the gap, starting at regional Internet registries, down to network operators in the lower hierarchy. To this end, we use public and complementary data sources and find that around 40% of allocated IPv4 address space has well-configured rDNS entries. We highlight regional differences as rDNS deployment is driven by mail and infrastructure providers in the developed world, while national Internet registries and national ISPs are drivers in the developing world. We study the use of classless delegation and the prevalence of configuration errors breaking DNS resolution. Finally, we observe that multi-regional organizations such as CDNs and mail providers actively invest effort towards improving rDNS deployment.

References

  1. Donald E. Eastlake 3rd and Aliza R. Panitz. 1999. Reserved Top Level DNS Names. RFC 2606. https://doi.org/10.17487/RFC2606Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mark P. Andrews. 2016. Adding 100.64.0.0/10 Prefixes to the IPv4 Locally-Served DNS Zones Registry. RFC 7793. https://doi.org/10.17487/RFC7793Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alfred Arouna, Ioana Livadariu, and Mattijs Jonker. 2023. Lowering the Barriers to Working with Public RIR-Level Data. In Proceedings of the Applied Networking Research Workshop. 24–26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Doug Barton. 2012. RFC 2317 Delegations for IPv4 Blocks Less Than /24. https://www.dougbarton.us/DNS/2317.htmlGoogle ScholarGoogle Scholar
  5. Kevin Borgolte, Shuang Hao, Tobias Fiebig, and Giovanni Vigna. 2018. Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 770–784.Google ScholarGoogle ScholarCross RefCross Ref
  6. CAIDA. [n. d.]. bgp.tools:Browse the Internet ecosystem. https://bgp.tools/Google ScholarGoogle Scholar
  7. CAIDA. 2023. Routeviews Prefix to AS mappings Dataset (pfx2as) for IPv4 and IPv6. https://www.caida.org/catalog/datasets/routeviews-prefix2as/Google ScholarGoogle Scholar
  8. Stuart Cheshire and Marc Krochmal. 2013. Special-Use Domain Names. RFC 6761. https://doi.org/10.17487/RFC6761Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gordon V Cormack 2008. Email spam filtering: A systematic review. Foundations and Trends® in Information Retrieval 1, 4 (2008), 335–455.Google ScholarGoogle ScholarCross RefCross Ref
  10. Leslie Daigle. 2004. WHOIS Protocol Specification. RFC 3912. https://doi.org/10.17487/RFC3912Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ovidiu Dan, Vaibhav Parikh, and Brian D Davison. 2018. Distributed reverse DNS geolocation. In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 1581–1586.Google ScholarGoogle ScholarCross RefCross Ref
  12. Ovidiu Dan, Vaibhav Parikh, and Brian D Davison. 2021. IP geolocation through reverse DNS. ACM Transactions on Internet Technology (TOIT) 22, 1 (2021), 1–29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Havard Eidnes, Paul A. Vixie, and Geert Jan de Groot. 1998. Classless IN-ADDR.ARPA delegation. RFC 2317. https://doi.org/10.17487/RFC2317Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. FBI. 2022. Business Email Compromise and Real Estate Wire Fraud. FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud. https://www.fbi.gov/file-repository/fy-2022-fbi-congressional-report-business-email-compromise-and-real-estate-wire-fraud-111422.pdf/viewGoogle ScholarGoogle Scholar
  15. Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, and Giovanni Vigna. 2017. Something from nothing (There): collecting global IPv6 datasets from DNS. In International Conference on Passive and Active Network Measurement. Springer, 30–43.Google ScholarGoogle ScholarCross RefCross Ref
  16. Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, and Anja Feldmann. 2018. In rDNS we trust: revisiting a common data-source’s reliability. In International Conference on Passive and Active Network Measurement. Springer, 131–145.Google ScholarGoogle ScholarCross RefCross Ref
  17. Kensuke Fukuda and John Heidemann. 2015. Detecting malicious activity with DNS backscatter. In Proceedings of the 2015 Internet Measurement Conference. 197–210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Paul E. Hoffman, Andrew Sullivan, and Kazunori Fujiwara. 2019. DNS Terminology. RFC 8499. https://doi.org/10.17487/RFC8499Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bradley Huffaker, Marina Fomenkov, and KC Claffy. 2014. DRoP: DNS-based router positioning. ACM SIGCOMM Computer Communication Review 44, 3 (2014), 5–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. IAB. 2001. Management Guidelines & Operational Requirements for the Address and Routing Parameter Area Domain ("arpa"). RFC 3172. https://doi.org/10.17487/RFC3172Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. IANA. 2022. IANA IPv4 Address Space Registry. https://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtmlGoogle ScholarGoogle Scholar
  22. Daniel Karrenberg. 2012. Conclusions Drawn from Reverse DNS Event. https://labs.ripe.net/author/dfk/conclusions-drawn-from-reverse-dns-event/Google ScholarGoogle Scholar
  23. Scott Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1. RFC 7208. https://doi.org/10.17487/RFC7208Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Youndo Lee and Neil Spring. 2017. Identifying and analyzing broadband internet reverse DNS names. In Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies. 35–40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, and Geoffrey M Voelker. 2021. Who’s got your mail? characterizing mail service provider usage. In Proceedings of the 21st ACM Internet Measurement Conference. 122–136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Matthew Luckie, Bradley Huffaker, Alexander Marder, Zachary Bischof, Marianne Fletcher, and K Claffy. 2021. Learning to extract geographic information from internet router hostnames. In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies. 440–453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. William F. Maton and Joe Abley. 2011. I’m Being Attacked by PRISONER.IANA.ORG!RFC 6305. https://doi.org/10.17487/RFC6305Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Mockapetris. 1987. Domain names - implementation and specification. RFC 1035. https://doi.org/10.17487/RFC1035Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Robert Moskowitz, Daniel Karrenberg, Yakov Rekhter, Eliot Lear, and Geert Jan de Groot. 1996. Address Allocation for Private Internets. RFC 1918. https://doi.org/10.17487/RFC1918Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Giovane CM Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, and Cristian Hesselman. 2020. Clouding up the internet: How centralized is dns traffic becoming?. In Proceedings of the ACM Internet Measurement Conference. 42–49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Jon Oberheide, Manish Karir, and Z Morley Mao. 2007. Characterizing dark dns behavior. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 140–156.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Number Resource Organization. 2023. RIR Comparative Policy Overview 2022-Q4. https://www.nro.net/wp-content/uploads/RIR-Comparative-Policy-Overview-2022-Q4.pdfGoogle ScholarGoogle Scholar
  33. Amreesh Phokeer, Alain Aina, and David Johnson. 2016. DNS Lame delegations: A case-study of public reverse DNS records in the African Region. In International Conference on e-Infrastructure and e-Services for Developing Countries. Springer, 232–242.Google ScholarGoogle Scholar
  34. Scott Rose and Wouter Wijngaards. 2012. DNAME Redirection in the DNS. RFC 6672. https://doi.org/10.17487/RFC6672Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Jukka Ruohonen. 2020. Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX Records. In 2020 IFIP Networking Conference (Networking). 815–820.Google ScholarGoogle Scholar
  36. Fernando Sanchez, Zhenhai Duan, and Yingfei Dong. 2011. Blocking spam by separating end-user machines from legitimate mail server machines. In Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. 116–124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Statista. 2022. Number of internet users worldwide as of 2022, by region. https://www.statista.com/statistics/249562/number-of-worldwide-internet-users-by-region/Google ScholarGoogle Scholar
  38. Olivier van der Toorn, Roland van Rijswijk-Deij, Raffaele Sommese, Anna Sperotto, and Mattijs Jonker. 2022. Saving Brian’s privacy: the perils of privacy exposure through reverse DNS. In Proceedings of the 22nd ACM Internet Measurement Conference. 1–13.Google ScholarGoogle Scholar
  39. Ming Zhang, Yaoping Ruan, Vivek S Pai, and Jennifer Rexford. 2006. How DNS Misnaming Distorts Internet Topology Mapping.. In USENIX Annual Technical Conference, General Track. 369–374.Google ScholarGoogle Scholar
  40. Zesen Zhang, Alexander Marder, Ricky Mok, Bradley Huffaker, Matthew Luckie, Kimberly C Claffy, and Aaron Schulman. 2021. Inferring regional access network topologies: methods and applications. In Proceedings of the 21st ACM Internet Measurement Conference. 720–738.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AINTEC '23: Proceedings of the 18th Asian Internet Engineering Conference
      December 2023
      129 pages
      ISBN:9798400709395
      DOI:10.1145/3630590

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 December 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Author Tags

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate15of38submissions,39%
    • Article Metrics

      • Downloads (Last 12 months)16
      • Downloads (Last 6 weeks)4

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format