Evaluating Anycast in the Domain Name System. Fan, X., Heidemann, J., & Govindan, R. In Proceedings of the IEEE Infocom, pages 1681–1689, Turin, Italy, April, 2013. IEEE. Paper abstract bibtex IP anycast is a central part of production DNS. While prior work has explored proximity, affinity and load balancing for some anycast services, there has been little attention to third-party discovery and enumeration of components of an anycast service. Enumeration can reveal abnormal service configurations, benign masquerading or hostile hijacking of anycast services, and help characterize anycast deployment. In this paper, we discuss two methods to identify and characterize anycast nodes. The first uses an existing anycast diagnosis method based on CHAOS-class DNS records but augments it with traceroute to resolve ambiguities. The second proposes Internet-class DNS records which permit accurate discovery through the use of existing recursive DNS infrastructure. We validate these two methods against three widely-used anycast DNS services, using a very large number (60k and 300k) of vantage points, and show that they can provide excellent precision and recall. Finally, we use these methods to evaluate anycast deployments in top-level domains (TLDs), and find one case where a third-party operates a server masquerading as a root DNS anycast node as well as a noticeable proportion of unusual DNS proxies. We also show that, across all TLDs, up to 72% use anycast.
@InProceedings{Fan13a,
author = "Xun Fan and John Heidemann and Ramesh Govindan",
title = "Evaluating Anycast in the Domain Name System",
booktitle = "Proceedings of the " # " IEEE Infocom",
year = 2013,
sortdate = "2013-04-01",
project = "ant, amite, lacrend, lander, research_root",
jsubject = "traffic_detection",
pages = "1681--1689",
month = apr,
address = "Turin, Italy",
publisher = "IEEE",
jlocation = "johnh: pafile",
keywords = "anycast, detection",
jlocation = "johnh: pafile",
keywords = "anycast, discovery, topology, DNS, F-root, PCH, Netalyzr",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "IEEE",
copyrightterms = " Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. ",
abstract = "IP anycast is a central part of production DNS. While prior work has
explored proximity, affinity and load balancing for some anycast
services, there has been little attention to third-party discovery and
enumeration of components of an anycast service. Enumeration can
reveal abnormal service configurations, benign masquerading or hostile
hijacking of anycast services, and help characterize anycast
deployment. In this paper, we discuss two methods to identify and
characterize anycast nodes. The first uses an existing anycast
diagnosis method based on CHAOS-class DNS records but augments it with
traceroute to resolve ambiguities. The second proposes Internet-class
DNS records which permit accurate discovery through the use of
existing recursive DNS infrastructure. We validate these two methods
against three widely-used anycast DNS services, using a very large
number (60k and 300k) of vantage points, and show that they can
provide excellent precision and recall. Finally, we use these methods
to evaluate anycast deployments in top-level domains (TLDs), and find
one case where a third-party operates a server masquerading as a root
DNS anycast node as well as a noticeable proportion of unusual DNS
proxies. We also show that, across all TLDs, up to 72\% use anycast."
,}
Downloads: 0
{"_id":"c4XY3AqzkGZJ4GRCg","bibbaseid":"fan-heidemann-govindan-evaluatinganycastinthedomainnamesystem-2013","author_short":["Fan, X.","Heidemann, J.","Govindan, R."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Xun"],"propositions":[],"lastnames":["Fan"],"suffixes":[]},{"firstnames":["John"],"propositions":[],"lastnames":["Heidemann"],"suffixes":[]},{"firstnames":["Ramesh"],"propositions":[],"lastnames":["Govindan"],"suffixes":[]}],"title":"Evaluating Anycast in the Domain Name System","booktitle":"Proceedings of the IEEE Infocom","year":"2013","sortdate":"2013-04-01","project":"ant, amite, lacrend, lander, research_root","jsubject":"traffic_detection","pages":"1681–1689","month":"April","address":"Turin, Italy","publisher":"IEEE","jlocation":"johnh: pafile","keywords":"anycast, discovery, topology, DNS, F-root, PCH, Netalyzr","url":"https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.html","pdfurl":"https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.pdf","myorganization":"USC/Information Sciences Institute","copyrightholder":"IEEE","copyrightterms":"Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. ","abstract":"IP anycast is a central part of production DNS. While prior work has explored proximity, affinity and load balancing for some anycast services, there has been little attention to third-party discovery and enumeration of components of an anycast service. Enumeration can reveal abnormal service configurations, benign masquerading or hostile hijacking of anycast services, and help characterize anycast deployment. In this paper, we discuss two methods to identify and characterize anycast nodes. The first uses an existing anycast diagnosis method based on CHAOS-class DNS records but augments it with traceroute to resolve ambiguities. The second proposes Internet-class DNS records which permit accurate discovery through the use of existing recursive DNS infrastructure. We validate these two methods against three widely-used anycast DNS services, using a very large number (60k and 300k) of vantage points, and show that they can provide excellent precision and recall. Finally, we use these methods to evaluate anycast deployments in top-level domains (TLDs), and find one case where a third-party operates a server masquerading as a root DNS anycast node as well as a noticeable proportion of unusual DNS proxies. We also show that, across all TLDs, up to 72% use anycast.","bibtex":"@InProceedings{Fan13a,\n\tauthor = \t\"Xun Fan and John Heidemann and Ramesh Govindan\",\n\ttitle = \t\"Evaluating Anycast in the Domain Name System\",\n\tbooktitle = \t\"Proceedings of the \" # \" IEEE Infocom\",\n\tyear = \t\t2013,\n\tsortdate = \t\t\"2013-04-01\",\n\tproject = \"ant, amite, lacrend, lander, research_root\",\n\tjsubject = \"traffic_detection\",\n\tpages = \t\"1681--1689\",\n\tmonth = \tapr,\n\taddress = \t\"Turin, Italy\",\n\tpublisher = \t\"IEEE\",\n\tjlocation = \t\"johnh: pafile\",\n\tkeywords = \t\"anycast, detection\",\n\tjlocation = \t\"johnh: pafile\",\n\tkeywords = \t\"anycast, discovery, topology, DNS, F-root, PCH, Netalyzr\",\n\turl =\t\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.html\",\n\tpdfurl =\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.pdf\",\n\tmyorganization =\t\"USC/Information Sciences Institute\",\n\tcopyrightholder = \"IEEE\",\n\tcopyrightterms = \"\tPersonal use of this material is permitted. Permission from IEEE must \tbe obtained for all other uses, in any current or future media, \tincluding reprinting/republishing this material for advertising or \tpromotional purposes, creating new collective works, for resale or \tredistribution to servers or lists, or reuse of any copyrighted \tcomponent of this work in other works. \",\n\tabstract = \"IP anycast is a central part of production DNS. While prior work has\nexplored proximity, affinity and load balancing for some anycast\nservices, there has been little attention to third-party discovery and\nenumeration of components of an anycast service. Enumeration can\nreveal abnormal service configurations, benign masquerading or hostile\nhijacking of anycast services, and help characterize anycast\ndeployment. In this paper, we discuss two methods to identify and\ncharacterize anycast nodes. The first uses an existing anycast\ndiagnosis method based on CHAOS-class DNS records but augments it with\ntraceroute to resolve ambiguities. The second proposes Internet-class\nDNS records which permit accurate discovery through the use of\nexisting recursive DNS infrastructure. We validate these two methods\nagainst three widely-used anycast DNS services, using a very large\nnumber (60k and 300k) of vantage points, and show that they can\nprovide excellent precision and recall. Finally, we use these methods\nto evaluate anycast deployments in top-level domains (TLDs), and find\none case where a third-party operates a server masquerading as a root\nDNS anycast node as well as a noticeable proportion of unusual DNS\nproxies. We also show that, across all TLDs, up to 72\\% use anycast.\"\n,}\n\n\n\n","author_short":["Fan, X.","Heidemann, J.","Govindan, R."],"bibbaseid":"fan-heidemann-govindan-evaluatinganycastinthedomainnamesystem-2013","role":"author","urls":{"Paper":"https://ant.isi.edu/%7ejohnh/PAPERS/Fan13a.html"},"keyword":["anycast","discovery","topology","DNS","F-root","PCH","Netalyzr"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/dHevizJoWEhWowz8q/johnh-2023-2.bib","dataSources":["YLyu3mj3xsBeoqiHK","fLZcDgNSoSuatv6aX","fxEParwu2ZfurScPY","7nuQvtHTqKrLmgu99"],"keywords":["anycast","discovery","topology","dns","f-root","pch","netalyzr"],"search_terms":["evaluating","anycast","domain","name","system","fan","heidemann","govindan"],"title":"Evaluating Anycast in the Domain Name System","year":2013}