SlideShare a Scribd company logo
1 of 47
Download to read offline
Measuring Recursive Resolver
Centrality
Geoff Huston, Joao Damas
APNIC Labs
Why pick on the DNS?
The DNS is used by everyone and everything
ā€¢ Because pretty much everything you do on the net starts with a call to
the DNS
ā€¢ If a single entity ā€œcontrolledā€ the entire DNS then to all practical
purposes that entity would control not just the DNS, but the entire
Internet!
This Presentation
ā€¢Whatā€™s the problem with centrality anyway?
ā€¢What does centrality in the DNS mean?
ā€¢How to measure DNS centrality
ā€¢What we measured
ā€¢What we think it means
3
Centrality
ā€¢ Many aspects of the Internetā€™s infrastructure are operated by
fewer and fewer entities over time
ā€¢ Shift from entrepreneurial ventures to established business
practices have largely driven these broad changes that have
resulted in amalgamation and market concentration in many
aspects of the Internetā€™s service provision
4
Whatā€™s the problem?
ā€¢ Economics A01 (or Adam Smithā€™s Invisible Hand)
ā€¢ Competition rewards efficient producers
ā€¢ Innovation that increases production efficiency is rewarded
ā€¢ Consumers benefit from increased production efficiency and innovation
ā€¢ Consolidation in the market
ā€¢ Distorts the functions of an open competitive market
ā€¢ Decreases competition pressure
ā€¢ Creates barriers to entry in the market
ā€¢ Reduces pressure for increased production efficiency and innovation
ā€¢ Consumers end up paying a premium
5
Consolidation in the DNS
ā€¢ Itā€™s not a new topic:
ā€¢ For many years BIND was a defacto monopoly provider for DNS software. At
the time almost every DNS recursive resolver and authoritative server ran
BIND software
ā€¢ Due to a deliberate effort to broaden the DNS resolver space from a
monoculture to a richer space, this picture has broadened out to a number of
DNS software platforms and is less of a concern these days
6
Consolidation in the DNS
Where else might we find consolidation in todayā€™s DNS?
ā€¢ Name Registration services
ā€¢ Name Hosting service providers
ā€¢ Name Resolution providers
7
Letā€™s Focus!
ā€¢ Here we are going to concentrate on just one of these areas
ā€¢ We will look at the recursive resolver market and try to understand
the extent to which we are seeing consolidation of the recursive
name resolution function
ā€¢ And then assess to what extent this represents a source of concern in
the DNS
8
Recursive Resolvers
ā€¢ This function is generally bundled with an ISPā€™s access service for
public network services
ā€¢ Which means that there is already some level of consolidation in this space as
the concentration of these DNS services follows the concentration of ISPs in
the retail market
9
https://stats.labs.apnic.net/aspop
Aside: Concentration in the retail ISP market
The ISP retail access market is already
heavily concentrated/centralised:
ā€¢ 10 ISPs serve some 30% of the
Internetā€™s user base
ā€¢ 90% of users are served by 1,000 ISPs
10
DNS Recursive Resolvers
ā€¢ This function is generally bundled with an ISPā€™s access service for
public network services
ā€¢ So we would expect to see a level of concentration in recursive resolvers in
line with the concentration in the ISP access market
ā€¢ The question is: Is there consolidation in the DNS recursive resolution
function over and above the existing access market consolidation?
ā€¢ Where might we see such consolidation?
11
Open DNS Resolvers
ā€¢ There are some 6M open DNS resolvers in operation today*
ā€¢ Most of these appear to be inadvertently open due to errant CPE
equipment
ā€¢ Where the resolver implementation does not correctly distinguish between
ā€œinsideā€ and ā€œoutsideā€ and provides a resolution service on all interfaces
ā€¢ That may sound like a large number, but it has got a whole lot better
over time!
ā€¢ 33M open resolvers were seen in 2013 **
12
* https://scan.shadowserver.org/dns/
** https://indico.dns-oarc.net/event/0/contributions/1/attachments/19/125/201305-dnsoarc-mauch-openresolver.pdf
Open DNS Resolvers as a Service
ā€¢ Others are explicitly configured to offer DNS resolution services as a open
service
ā€¢ Hard to say where all this started, but an early example was the the 4.2.2.2 open
resolver project offered by BBN Planet in the mid-90ā€™s, though there were many
others even then
ā€¢ At that time many ISPs used recursive resolvers as a service and some operated these
platforms as a open service as a least cost / lowest admin overhead option
ā€¢ The use of anycast in the DNS made it possible to operate a single service with a
distributed footprint
ā€¢ OpenDNS was one of the early offerings of a dedicated recursive resolution service
with a scaled up infrastructure
ā€¢ Google Public DNS entered the picture with a service that took scaling to the next
level
13
* https://scan.shadowserver.org/dns/
Whatā€™s the Centrality Question here?
ā€¢ One way to measure centrality is by ā€œmarket shareā€
ā€¢ So the market share question here would be: What proportion of
users of the Internet use <X> as their DNS resolver?
ā€¢ We wonā€™t distinguish between end users explicitly adding their own DNS
configuration into their platform and ISPs using forwarding structures to pass
all DNS queries to an open resolver. Through the lens of ā€œcentralityā€ both
paths to using open DNS resolvers look the same!
14
How we* Measure DNS Centrality
ā€¢ We use Google Ads as the main element of this measurement
ā€¢ The measurement script is an embedded block of HTML5 code in an Ad
ā€¢ The Ad runs in campaigns that generate some 10M impressions per day
ā€¢ We get to ā€œseeā€ the DNS in operation from the inside of most mid-to-large
ISPs and service providers across the entire Internet
ā€¢ Ads provide very little functionality in the embedded scripts ā€“ itā€™s
basically limited to fetching URLs
ā€¢ But thatā€™s enough here, as a URL fetch involves the resolution of a domain
name
ā€¢ So we use unique DNS names in every ad, so the DNS queries will be passed
though to our authoritative servers
15
* by ā€œweā€ I mean APNIC Labs!
How we Measure DNS Centrality
16
DNS Stuff!
Stub-to-recursive
DNS Query
Resolver Engine
Authoritative Server
Ad delivery
Userā€“toā€“recursive resolver
mapping
Recursive-to-Authoritative
DNS Query
Recursive Resolver Behaviours
ā€¢ The task is to match the source of a query of a domain name to both
a resolver and an end user
ā€¢ We need to
ā€¢ map query IP source addresses to resolvers
ā€¢ understand how the DNS ā€œmanagesā€ queries
ā€¢ how the resolver lists in /etc/resolv.conf are used
17
Mapping Resolver Addresses
ā€¢ We use periodic sweeps with RIPE Atlas to reveal the engine
addresses used by popular Open DNS resolvers, and load this into an
identification database
18
Understanding Resolver Behaviour
19
Query Distributor
Resolver Engine
Resolver Engine
Resolver Engine
Resolver Engine
From Client
To Server
Service
Address
Engine
Address
Resolution Metrics
ā€¢ Average query count per unique name: 3.4
(Dual stack hosts may be a factor here)
ā€¢ Max observed query count in 30 seconds is 1,761 queries!
20
0%
5%
10%
15%
20%
25%
30%
35%
1 2 3 4 5 6 7 8 9 10
%
of
names
Number of queries
Queries per Name
30%
20%
10%
Resolution Metrics
ā€¢ Average number of resolvers (IP addresses) per unique name: 2.1
ā€¢ 30 second maximum resolvers seen: 94
21
0%
10%
20%
30%
40%
50%
60%
1 2 3 4 5 6 7 8 9 10
%
of
names
Number of resolvers
Resolvers (IP addrs) per Name
10%
20%
30%
40%
50%
First Resolver vs Full Resolver Set
ā€¢ What happens if the authoritative server always reports SERVFAIL to
all queries?
ā€¢ We use a server that always returns a SERVFAIL error code to prompt
the client to run through its full set of recursive resolvers
22
SERVFAIL Resolution Metrics
ā€¢ Average query count per unique name: 36.5
ā€¢ Max observed query count in 30 seconds is 292,942 queries!
23
0%
1%
1%
2%
2%
3%
3%
4%
4%
5%
5%
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
%
of
names
Number of queries
Queries per Name
1%
2%
3%
4%
(yes, really!)
SERVFAIL Resolution Metrics
ā€¢ Average number of resolvers (IP addresses) per unique name: 8.9
ā€¢ 30 second maximum resolvers seen: 1,368
24
0%
2%
4%
6%
8%
10%
12%
14%
16%
18%
20%
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
%
of
names
Number of resolvers
Resolvers per Name
4%
8%
12%
16%
Recursive Resolver Stats
25
Of the 140,000 visible recursive resolvers, just 150
resolvers account for 20% of all users and 1,500
resolvers account for 50% of all users.
10,000 resolvers account for 90% of all users
However we are looking here at resolver IP addresses,
and thatā€™s probably misleading.
Lets try and group resolver IP addresses into resolver
services
Recursive Resolver Stats
26
Of the 14,600 visible recursive resolvers services, just 15
resolver services serve 50% of users
250 resolver services serve 90% of users
Is this what we mean by ā€œcentralisationā€?
Details
Lets break this data down into:
ā€¢ Using a ā€œknownā€ open DNS resolver
ā€¢ Using a resolver in the same AS as the user
ā€¢ Using a resolver in the same country as the user
ā€¢ Others
27
ā€Firstā€ Resolver Use
28
70% of users use a resolver located in the
same AS as the user (ISP resolver)
17% of users use a resolver located in the
same CC as the user (ISP resolver?)
15% of users use the Google open resolver
(8.8.8.8)
All Resolver Use (SERVFAIL)
29
70% -> 72% for same ISP
15% -> 29% for Google use
(yes, the plotting software performed a
colour change ā€“ sorry!)
Google DNS
30
Use of Google Service per CC
Within each country how many users
In that country use Googleā€™s resolver?
Google DNS
31
Use of Google Service by User Count
Looking at the total population of users
using Googleā€™s service, where are they
located?
Google DNS
ā€¢ Google DNS use appears to be equally split between first use (15% of
users) and backup resolvers (a further 14% of users)
ā€¢ Within each economy Google DNS is heavily used in some African
economies, and central and southern Asian economies
ā€¢ The largest pool of Google DNS users are located in India (19% of
Google DNS users)
ā€¢ Significant pools Google users are also seen in the US, China, Nigeria,
Brazil and Iran (each CC has some 4% - 6% of Googleā€™s DNS users)
32
Cloudflareā€™s 1.1.1.1 service
33
Where is Cloudflare used?
Cloudflare is extensively used in Turkmenistan (80%), Iran (57%), Niger (54%)
Cameroon (54%) and the Congo (49%)
Cloudflare market share
Cloudflare User breakdown?
Quad9 service
34
Where is Quad9 used?
Quad9 market share
Quad9 User breakdown?
Iran
35
A major ISP in IRAN, MCCI, distributes its
queries across Google, Cloudflare,
Yandex, Neustar, OpenDNS, Quad9 and
others ā€“ all at once!
Who makes the choice?
ā€¢ Is this the ISPā€˜s resolver performing forwarding of the query to an
open resolver, or the users themselves opting out of the ISP service?
ā€¢ The numbers vary, but it is quite common to see 60% - 80% of users in an AS
having their queries sent to an open resolver when open resolvers are used
36
Who makes the choice?
ā€¢ Is this the ISPā€˜s resolver performing forwarding of the query to an
open resolver, or the users themselves opting out of the ISP service?
ā€¢ The numbers vary, but it is quite common to see 60% - 80% of users in an AS
having their queries sent to an open resolver when open resolvers are used
37
Google DNS at 86%
OpenDNS at 27%
Resolver Centrality?
ā€¢ Its not a ā€œsmall numberā€ of open resolvers
ā€¢ Itā€™s just 1 ā€“ Googleā€™s Public DNS
ā€¢ Its not end users reconfiguring their devices
ā€¢ Itā€™s the ISP
ā€¢ And where its not the ISP itā€™s mainly enterprise customers of ISPs
ā€¢ Is this changing?
ā€¢ Yes, but quite slowly
38
Commentary and Opinions
What follows are opinions not data!
39
Is this a centrality ā€œproblemā€?
ā€¢ It this an emerging distortion of the market that puts excessive
market control in the hands of a small set of providers?
ā€¢ A lot of users have the DNS users passed on to auth servers via Googleā€™s
service
ā€¢ But does this present us with issues?
ā€¢ 8.8.8.8 is fast, supports DNSSEC validation and does not filter or alter DNS responses (as
far as I am aware)
ā€¢ Its cheap, its fast, its well managed, and it works reliably
ā€¢ So whatā€™s the issue?
40
41
https://xkcd.com/1361/
Whatā€™s the problem here?
ā€¢ Itā€™s a sensitive issue these days
ā€¢ There are many privacy undertakings in our space, but the undeniable fact
is that many ā€œfreeā€ services are indirectly funded through advertising
revenue, and advertising is based on individual tracking and profiling
ā€¢ Open DNS providers typically provide undertakings that they do not use
their query traffic for profiling - and I have no evidence that these
undertakings are not being adhered to
But I still have some questions as a consumer of their services:
ā€¢ How are these undertakings audited and/or enforced? By whom?
ā€¢ Are there penalties for breaches of these undertakings?
ā€¢ Considering the size of these actors are any of these penalties even meaningful?
42
Barriers to Entry
ā€¢ Why is there one 1 very large Open DNS provider?
ā€¢ Is it because the incumbent is raising the barriers of entry to all
potential competitors?
ā€¢ Unlikely, as there is no evidence that this is the case
ā€¢ Or are there ā€œnaturalā€ barriers to entry?
43
ā€œNaturalā€ Barriers to Entry
ā€¢ The DNS economy is such a financial wasteland that few have a
natural incentive to enter this market
ā€¢ No one pays for queries
ā€¢ Selling query logs can very damaging in terms of reputation and liability ā€“
particularly when you cannot get the usersā€™ informed consent to do so
ā€¢ Selling NXDOMAIN substitution is also very damaging in terms of reputation
ā€¢ It can be argued* that only someone with a massive presence is
search has a commercial case for deploying a DNS resolver that is
ā€œhonestā€ about the DNS (including NXDOMAIN)
44
* And some have from time to time
Butā€¦
45
Is all this a distraction?
ā€¢ Itā€™s more likely that the shift of DNS functions into application realms
using DoH services as an application function is a far greater threat to
the current model of the DNS as a common single infrastructure
ā€¢ Maybe the convergence of
ā€¢ increased autonomy of applications in todayā€™s Internet
ā€¢ the dominant position of Android
ā€¢ The dominant position of Chrome
poses a greater potential threat to the integrity of the name
infrastructure of the Internet than the issue of recursive resolver use
46
Thanks!
Report on Resolver Use: https://stats.labs.apnic.net/rvrs

More Related Content

What's hot

DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020APNIC
Ā 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoSAPNIC
Ā 
IETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSIETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSAPNIC
Ā 
RIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsRIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsAPNIC
Ā 
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSDINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSAPNIC
Ā 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?APNIC
Ā 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI MattersAPNIC
Ā 
RIPE 76: Measuring ATR
RIPE 76: Measuring ATRRIPE 76: Measuring ATR
RIPE 76: Measuring ATRAPNIC
Ā 
RIPE 76: TCP and BBR
RIPE 76: TCP and BBRRIPE 76: TCP and BBR
RIPE 76: TCP and BBRAPNIC
Ā 
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam ObszyńskiPLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam ObszyńskiPROIDEA
Ā 
DNS Openness
DNS OpennessDNS Openness
DNS OpennessAPNIC
Ā 
Experience Using RIR Whois
Experience Using RIR WhoisExperience Using RIR Whois
Experience Using RIR WhoisAPNIC
Ā 
How Time To First Byte (TTFB) Impacts Your Siteā€™s Performance
How Time To First Byte (TTFB) Impacts Your Siteā€™s PerformanceHow Time To First Byte (TTFB) Impacts Your Siteā€™s Performance
How Time To First Byte (TTFB) Impacts Your Siteā€™s PerformanceMedianova
Ā 
Surge 2014 - Kris Beevers - Data Driven DNS
Surge 2014 - Kris Beevers - Data Driven DNSSurge 2014 - Kris Beevers - Data Driven DNS
Surge 2014 - Kris Beevers - Data Driven DNSNS1
Ā 
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...Cloudflare
Ā 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateAPNIC
Ā 
Network latency - measurement and improvement
Network latency - measurement and improvementNetwork latency - measurement and improvement
Network latency - measurement and improvementMatt Willsher
Ā 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECAPNIC
Ā 
NANOG 74: That KSK Roll
NANOG 74: That KSK RollNANOG 74: That KSK Roll
NANOG 74: That KSK RollAPNIC
Ā 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
Ā 

What's hot (20)

DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020
Ā 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
Ā 
IETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSIETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNS
Ā 
RIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsRIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurements
Ā 
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSDINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
Ā 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?
Ā 
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
2nd ICANN APAC-TWNIC Engagement Forum: Why RPKI Matters
Ā 
RIPE 76: Measuring ATR
RIPE 76: Measuring ATRRIPE 76: Measuring ATR
RIPE 76: Measuring ATR
Ā 
RIPE 76: TCP and BBR
RIPE 76: TCP and BBRRIPE 76: TCP and BBR
RIPE 76: TCP and BBR
Ā 
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam ObszyńskiPLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam Obszyński
PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurĆ³w - Adam Obszyński
Ā 
DNS Openness
DNS OpennessDNS Openness
DNS Openness
Ā 
Experience Using RIR Whois
Experience Using RIR WhoisExperience Using RIR Whois
Experience Using RIR Whois
Ā 
How Time To First Byte (TTFB) Impacts Your Siteā€™s Performance
How Time To First Byte (TTFB) Impacts Your Siteā€™s PerformanceHow Time To First Byte (TTFB) Impacts Your Siteā€™s Performance
How Time To First Byte (TTFB) Impacts Your Siteā€™s Performance
Ā 
Surge 2014 - Kris Beevers - Data Driven DNS
Surge 2014 - Kris Beevers - Data Driven DNSSurge 2014 - Kris Beevers - Data Driven DNS
Surge 2014 - Kris Beevers - Data Driven DNS
Ā 
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
Ā 
VNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment UpdateVNIX-NOG 2021: IPv6 Deployment Update
VNIX-NOG 2021: IPv6 Deployment Update
Ā 
Network latency - measurement and improvement
Network latency - measurement and improvementNetwork latency - measurement and improvement
Network latency - measurement and improvement
Ā 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSEC
Ā 
NANOG 74: That KSK Roll
NANOG 74: That KSK RollNANOG 74: That KSK Roll
NANOG 74: That KSK Roll
Ā 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
Ā 

Similar to Measuring Recursive Resolver Centrality

DNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we useDNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we useAPNIC
Ā 
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff HustonResolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff HustonAPNIC
Ā 
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Measuring the centralization of DNS resolution'  presentation by Geoff Huston...Measuring the centralization of DNS resolution'  presentation by Geoff Huston...
Measuring the centralization of DNS resolution' presentation by Geoff Huston...APNIC
Ā 
RIPE 86: DNS in EU before dns4EU
RIPE 86: DNS in EU before dns4EURIPE 86: DNS in EU before dns4EU
RIPE 86: DNS in EU before dns4EUAPNIC
Ā 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User APNIC
Ā 
IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73APNIC
Ā 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS OpennessAPNIC
Ā 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Responsepm123008
Ā 
Consul: Service-oriented at Scale
Consul: Service-oriented at ScaleConsul: Service-oriented at Scale
Consul: Service-oriented at ScaleC4Media
Ā 
Canary Analyze All The Things: How We Learned to Keep Calm and Release Often
Canary Analyze All The Things: How We Learned to Keep Calm and Release OftenCanary Analyze All The Things: How We Learned to Keep Calm and Release Often
Canary Analyze All The Things: How We Learned to Keep Calm and Release OftenC4Media
Ā 
Measuring the end user
Measuring the end userMeasuring the end user
Measuring the end userAPNIC
Ā 
ICANN DNS Symposium 2019: Resolver Centrality
ICANN DNS Symposium 2019: Resolver CentralityICANN DNS Symposium 2019: Resolver Centrality
ICANN DNS Symposium 2019: Resolver CentralityAPNIC
Ā 
Pmw2 k3ni 1-3b
Pmw2 k3ni 1-3bPmw2 k3ni 1-3b
Pmw2 k3ni 1-3bhariclant1
Ā 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
Ā 
Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...
Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...
Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...Dominopoint - Italian Lotus User Group
Ā 
DNS Measurements
DNS MeasurementsDNS Measurements
DNS MeasurementsAFRINIC
Ā 
Managed dns webinar 2015 internap
Managed dns webinar 2015 internapManaged dns webinar 2015 internap
Managed dns webinar 2015 internapInternap
Ā 
The Resolvers We Use
The Resolvers We UseThe Resolvers We Use
The Resolvers We UseAPNIC
Ā 
ThousandEyes EMEA - Become the Master of Your DNS
ThousandEyes EMEA - Become the Master of Your DNSThousandEyes EMEA - Become the Master of Your DNS
ThousandEyes EMEA - Become the Master of Your DNSThousandEyes
Ā 
WebEx performance monitoring
WebEx performance monitoringWebEx performance monitoring
WebEx performance monitoringThousandEyes
Ā 

Similar to Measuring Recursive Resolver Centrality (20)

DNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we useDNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we use
Ā 
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff HustonResolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Ā 
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Measuring the centralization of DNS resolution'  presentation by Geoff Huston...Measuring the centralization of DNS resolution'  presentation by Geoff Huston...
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Ā 
RIPE 86: DNS in EU before dns4EU
RIPE 86: DNS in EU before dns4EURIPE 86: DNS in EU before dns4EU
RIPE 86: DNS in EU before dns4EU
Ā 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User
Ā 
IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73
Ā 
NANOG 84: DNS Openness
NANOG 84: DNS OpennessNANOG 84: DNS Openness
NANOG 84: DNS Openness
Ā 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
Ā 
Consul: Service-oriented at Scale
Consul: Service-oriented at ScaleConsul: Service-oriented at Scale
Consul: Service-oriented at Scale
Ā 
Canary Analyze All The Things: How We Learned to Keep Calm and Release Often
Canary Analyze All The Things: How We Learned to Keep Calm and Release OftenCanary Analyze All The Things: How We Learned to Keep Calm and Release Often
Canary Analyze All The Things: How We Learned to Keep Calm and Release Often
Ā 
Measuring the end user
Measuring the end userMeasuring the end user
Measuring the end user
Ā 
ICANN DNS Symposium 2019: Resolver Centrality
ICANN DNS Symposium 2019: Resolver CentralityICANN DNS Symposium 2019: Resolver Centrality
ICANN DNS Symposium 2019: Resolver Centrality
Ā 
Pmw2 k3ni 1-3b
Pmw2 k3ni 1-3bPmw2 k3ni 1-3b
Pmw2 k3ni 1-3b
Ā 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
Ā 
Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...
Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...
Back to the Future: Understand and Optimize your IBM Notes and Domino Infrast...
Ā 
DNS Measurements
DNS MeasurementsDNS Measurements
DNS Measurements
Ā 
Managed dns webinar 2015 internap
Managed dns webinar 2015 internapManaged dns webinar 2015 internap
Managed dns webinar 2015 internap
Ā 
The Resolvers We Use
The Resolvers We UseThe Resolvers We Use
The Resolvers We Use
Ā 
ThousandEyes EMEA - Become the Master of Your DNS
ThousandEyes EMEA - Become the Master of Your DNSThousandEyes EMEA - Become the Master of Your DNS
ThousandEyes EMEA - Become the Master of Your DNS
Ā 
WebEx performance monitoring
WebEx performance monitoringWebEx performance monitoring
WebEx performance monitoring
Ā 

More from APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Ā 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Ā 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
Ā 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
Ā 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
Ā 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Ā 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
Ā 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
Ā 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
Ā 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
Ā 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
Ā 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
Ā 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
Ā 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
Ā 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
Ā 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
Ā 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
Ā 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
Ā 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
Ā 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessAPNIC
Ā 

More from APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
Ā 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
Ā 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Ā 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
Ā 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Ā 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Ā 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
Ā 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
Ā 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
Ā 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
Ā 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
Ā 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
Ā 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
Ā 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
Ā 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
Ā 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
Ā 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Ā 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
Ā 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
Ā 
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or lessPacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
PacNOG 32: Resource Public Key Infrastructure (RPKI) in 30 minutes or less
Ā 

Recently uploaded

Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
Ā 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
Ā 
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čÆä¹¦ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čƁ书rnrncn29
Ā 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
Ā 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
Ā 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
Ā 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
Ā 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
Ā 
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作ys8omjxb
Ā 
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€z xss
Ā 
办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书
办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书
办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书zdzoqco
Ā 
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čÆä¹¦ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čƁ书rnrncn29
Ā 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
Ā 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
Ā 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
Ā 

Recently uploaded (17)

Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Ā 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
Ā 
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čÆä¹¦ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°ę‹‰ē­¹ä¼Æ大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²LTUę–‡å‡­å­¦ä½čƁ书
Ā 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
Ā 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
Ā 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
Ā 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
Ā 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
Ā 
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Ā 
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书
办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书
办ē†å¤šä¼¦å¤šå¤§å­¦ęƕäøščÆęˆē»©å•|č“­ä¹°åŠ ę‹æ大UTSGę–‡å‡­čƁ书
Ā 
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čÆä¹¦ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čƁ书
ć€Žę¾³ę“²ę–‡å‡­ć€ä¹°č©¹å§†å£«åŗ“克大学ęƕäøščÆä¹¦ęˆē»©å•åŠžē†ę¾³ę“²JCUę–‡å‡­å­¦ä½čƁ书
Ā 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Ā 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
Ā 
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
Ā 

Measuring Recursive Resolver Centrality

  • 1. Measuring Recursive Resolver Centrality Geoff Huston, Joao Damas APNIC Labs
  • 2. Why pick on the DNS? The DNS is used by everyone and everything ā€¢ Because pretty much everything you do on the net starts with a call to the DNS ā€¢ If a single entity ā€œcontrolledā€ the entire DNS then to all practical purposes that entity would control not just the DNS, but the entire Internet!
  • 3. This Presentation ā€¢Whatā€™s the problem with centrality anyway? ā€¢What does centrality in the DNS mean? ā€¢How to measure DNS centrality ā€¢What we measured ā€¢What we think it means 3
  • 4. Centrality ā€¢ Many aspects of the Internetā€™s infrastructure are operated by fewer and fewer entities over time ā€¢ Shift from entrepreneurial ventures to established business practices have largely driven these broad changes that have resulted in amalgamation and market concentration in many aspects of the Internetā€™s service provision 4
  • 5. Whatā€™s the problem? ā€¢ Economics A01 (or Adam Smithā€™s Invisible Hand) ā€¢ Competition rewards efficient producers ā€¢ Innovation that increases production efficiency is rewarded ā€¢ Consumers benefit from increased production efficiency and innovation ā€¢ Consolidation in the market ā€¢ Distorts the functions of an open competitive market ā€¢ Decreases competition pressure ā€¢ Creates barriers to entry in the market ā€¢ Reduces pressure for increased production efficiency and innovation ā€¢ Consumers end up paying a premium 5
  • 6. Consolidation in the DNS ā€¢ Itā€™s not a new topic: ā€¢ For many years BIND was a defacto monopoly provider for DNS software. At the time almost every DNS recursive resolver and authoritative server ran BIND software ā€¢ Due to a deliberate effort to broaden the DNS resolver space from a monoculture to a richer space, this picture has broadened out to a number of DNS software platforms and is less of a concern these days 6
  • 7. Consolidation in the DNS Where else might we find consolidation in todayā€™s DNS? ā€¢ Name Registration services ā€¢ Name Hosting service providers ā€¢ Name Resolution providers 7
  • 8. Letā€™s Focus! ā€¢ Here we are going to concentrate on just one of these areas ā€¢ We will look at the recursive resolver market and try to understand the extent to which we are seeing consolidation of the recursive name resolution function ā€¢ And then assess to what extent this represents a source of concern in the DNS 8
  • 9. Recursive Resolvers ā€¢ This function is generally bundled with an ISPā€™s access service for public network services ā€¢ Which means that there is already some level of consolidation in this space as the concentration of these DNS services follows the concentration of ISPs in the retail market 9 https://stats.labs.apnic.net/aspop
  • 10. Aside: Concentration in the retail ISP market The ISP retail access market is already heavily concentrated/centralised: ā€¢ 10 ISPs serve some 30% of the Internetā€™s user base ā€¢ 90% of users are served by 1,000 ISPs 10
  • 11. DNS Recursive Resolvers ā€¢ This function is generally bundled with an ISPā€™s access service for public network services ā€¢ So we would expect to see a level of concentration in recursive resolvers in line with the concentration in the ISP access market ā€¢ The question is: Is there consolidation in the DNS recursive resolution function over and above the existing access market consolidation? ā€¢ Where might we see such consolidation? 11
  • 12. Open DNS Resolvers ā€¢ There are some 6M open DNS resolvers in operation today* ā€¢ Most of these appear to be inadvertently open due to errant CPE equipment ā€¢ Where the resolver implementation does not correctly distinguish between ā€œinsideā€ and ā€œoutsideā€ and provides a resolution service on all interfaces ā€¢ That may sound like a large number, but it has got a whole lot better over time! ā€¢ 33M open resolvers were seen in 2013 ** 12 * https://scan.shadowserver.org/dns/ ** https://indico.dns-oarc.net/event/0/contributions/1/attachments/19/125/201305-dnsoarc-mauch-openresolver.pdf
  • 13. Open DNS Resolvers as a Service ā€¢ Others are explicitly configured to offer DNS resolution services as a open service ā€¢ Hard to say where all this started, but an early example was the the 4.2.2.2 open resolver project offered by BBN Planet in the mid-90ā€™s, though there were many others even then ā€¢ At that time many ISPs used recursive resolvers as a service and some operated these platforms as a open service as a least cost / lowest admin overhead option ā€¢ The use of anycast in the DNS made it possible to operate a single service with a distributed footprint ā€¢ OpenDNS was one of the early offerings of a dedicated recursive resolution service with a scaled up infrastructure ā€¢ Google Public DNS entered the picture with a service that took scaling to the next level 13 * https://scan.shadowserver.org/dns/
  • 14. Whatā€™s the Centrality Question here? ā€¢ One way to measure centrality is by ā€œmarket shareā€ ā€¢ So the market share question here would be: What proportion of users of the Internet use <X> as their DNS resolver? ā€¢ We wonā€™t distinguish between end users explicitly adding their own DNS configuration into their platform and ISPs using forwarding structures to pass all DNS queries to an open resolver. Through the lens of ā€œcentralityā€ both paths to using open DNS resolvers look the same! 14
  • 15. How we* Measure DNS Centrality ā€¢ We use Google Ads as the main element of this measurement ā€¢ The measurement script is an embedded block of HTML5 code in an Ad ā€¢ The Ad runs in campaigns that generate some 10M impressions per day ā€¢ We get to ā€œseeā€ the DNS in operation from the inside of most mid-to-large ISPs and service providers across the entire Internet ā€¢ Ads provide very little functionality in the embedded scripts ā€“ itā€™s basically limited to fetching URLs ā€¢ But thatā€™s enough here, as a URL fetch involves the resolution of a domain name ā€¢ So we use unique DNS names in every ad, so the DNS queries will be passed though to our authoritative servers 15 * by ā€œweā€ I mean APNIC Labs!
  • 16. How we Measure DNS Centrality 16 DNS Stuff! Stub-to-recursive DNS Query Resolver Engine Authoritative Server Ad delivery Userā€“toā€“recursive resolver mapping Recursive-to-Authoritative DNS Query
  • 17. Recursive Resolver Behaviours ā€¢ The task is to match the source of a query of a domain name to both a resolver and an end user ā€¢ We need to ā€¢ map query IP source addresses to resolvers ā€¢ understand how the DNS ā€œmanagesā€ queries ā€¢ how the resolver lists in /etc/resolv.conf are used 17
  • 18. Mapping Resolver Addresses ā€¢ We use periodic sweeps with RIPE Atlas to reveal the engine addresses used by popular Open DNS resolvers, and load this into an identification database 18
  • 19. Understanding Resolver Behaviour 19 Query Distributor Resolver Engine Resolver Engine Resolver Engine Resolver Engine From Client To Server Service Address Engine Address
  • 20. Resolution Metrics ā€¢ Average query count per unique name: 3.4 (Dual stack hosts may be a factor here) ā€¢ Max observed query count in 30 seconds is 1,761 queries! 20 0% 5% 10% 15% 20% 25% 30% 35% 1 2 3 4 5 6 7 8 9 10 % of names Number of queries Queries per Name 30% 20% 10%
  • 21. Resolution Metrics ā€¢ Average number of resolvers (IP addresses) per unique name: 2.1 ā€¢ 30 second maximum resolvers seen: 94 21 0% 10% 20% 30% 40% 50% 60% 1 2 3 4 5 6 7 8 9 10 % of names Number of resolvers Resolvers (IP addrs) per Name 10% 20% 30% 40% 50%
  • 22. First Resolver vs Full Resolver Set ā€¢ What happens if the authoritative server always reports SERVFAIL to all queries? ā€¢ We use a server that always returns a SERVFAIL error code to prompt the client to run through its full set of recursive resolvers 22
  • 23. SERVFAIL Resolution Metrics ā€¢ Average query count per unique name: 36.5 ā€¢ Max observed query count in 30 seconds is 292,942 queries! 23 0% 1% 1% 2% 2% 3% 3% 4% 4% 5% 5% 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 % of names Number of queries Queries per Name 1% 2% 3% 4% (yes, really!)
  • 24. SERVFAIL Resolution Metrics ā€¢ Average number of resolvers (IP addresses) per unique name: 8.9 ā€¢ 30 second maximum resolvers seen: 1,368 24 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 % of names Number of resolvers Resolvers per Name 4% 8% 12% 16%
  • 25. Recursive Resolver Stats 25 Of the 140,000 visible recursive resolvers, just 150 resolvers account for 20% of all users and 1,500 resolvers account for 50% of all users. 10,000 resolvers account for 90% of all users However we are looking here at resolver IP addresses, and thatā€™s probably misleading. Lets try and group resolver IP addresses into resolver services
  • 26. Recursive Resolver Stats 26 Of the 14,600 visible recursive resolvers services, just 15 resolver services serve 50% of users 250 resolver services serve 90% of users Is this what we mean by ā€œcentralisationā€?
  • 27. Details Lets break this data down into: ā€¢ Using a ā€œknownā€ open DNS resolver ā€¢ Using a resolver in the same AS as the user ā€¢ Using a resolver in the same country as the user ā€¢ Others 27
  • 28. ā€Firstā€ Resolver Use 28 70% of users use a resolver located in the same AS as the user (ISP resolver) 17% of users use a resolver located in the same CC as the user (ISP resolver?) 15% of users use the Google open resolver (8.8.8.8)
  • 29. All Resolver Use (SERVFAIL) 29 70% -> 72% for same ISP 15% -> 29% for Google use (yes, the plotting software performed a colour change ā€“ sorry!)
  • 30. Google DNS 30 Use of Google Service per CC Within each country how many users In that country use Googleā€™s resolver?
  • 31. Google DNS 31 Use of Google Service by User Count Looking at the total population of users using Googleā€™s service, where are they located?
  • 32. Google DNS ā€¢ Google DNS use appears to be equally split between first use (15% of users) and backup resolvers (a further 14% of users) ā€¢ Within each economy Google DNS is heavily used in some African economies, and central and southern Asian economies ā€¢ The largest pool of Google DNS users are located in India (19% of Google DNS users) ā€¢ Significant pools Google users are also seen in the US, China, Nigeria, Brazil and Iran (each CC has some 4% - 6% of Googleā€™s DNS users) 32
  • 33. Cloudflareā€™s 1.1.1.1 service 33 Where is Cloudflare used? Cloudflare is extensively used in Turkmenistan (80%), Iran (57%), Niger (54%) Cameroon (54%) and the Congo (49%) Cloudflare market share Cloudflare User breakdown?
  • 34. Quad9 service 34 Where is Quad9 used? Quad9 market share Quad9 User breakdown?
  • 35. Iran 35 A major ISP in IRAN, MCCI, distributes its queries across Google, Cloudflare, Yandex, Neustar, OpenDNS, Quad9 and others ā€“ all at once!
  • 36. Who makes the choice? ā€¢ Is this the ISPā€˜s resolver performing forwarding of the query to an open resolver, or the users themselves opting out of the ISP service? ā€¢ The numbers vary, but it is quite common to see 60% - 80% of users in an AS having their queries sent to an open resolver when open resolvers are used 36
  • 37. Who makes the choice? ā€¢ Is this the ISPā€˜s resolver performing forwarding of the query to an open resolver, or the users themselves opting out of the ISP service? ā€¢ The numbers vary, but it is quite common to see 60% - 80% of users in an AS having their queries sent to an open resolver when open resolvers are used 37 Google DNS at 86% OpenDNS at 27%
  • 38. Resolver Centrality? ā€¢ Its not a ā€œsmall numberā€ of open resolvers ā€¢ Itā€™s just 1 ā€“ Googleā€™s Public DNS ā€¢ Its not end users reconfiguring their devices ā€¢ Itā€™s the ISP ā€¢ And where its not the ISP itā€™s mainly enterprise customers of ISPs ā€¢ Is this changing? ā€¢ Yes, but quite slowly 38
  • 39. Commentary and Opinions What follows are opinions not data! 39
  • 40. Is this a centrality ā€œproblemā€? ā€¢ It this an emerging distortion of the market that puts excessive market control in the hands of a small set of providers? ā€¢ A lot of users have the DNS users passed on to auth servers via Googleā€™s service ā€¢ But does this present us with issues? ā€¢ 8.8.8.8 is fast, supports DNSSEC validation and does not filter or alter DNS responses (as far as I am aware) ā€¢ Its cheap, its fast, its well managed, and it works reliably ā€¢ So whatā€™s the issue? 40
  • 42. Whatā€™s the problem here? ā€¢ Itā€™s a sensitive issue these days ā€¢ There are many privacy undertakings in our space, but the undeniable fact is that many ā€œfreeā€ services are indirectly funded through advertising revenue, and advertising is based on individual tracking and profiling ā€¢ Open DNS providers typically provide undertakings that they do not use their query traffic for profiling - and I have no evidence that these undertakings are not being adhered to But I still have some questions as a consumer of their services: ā€¢ How are these undertakings audited and/or enforced? By whom? ā€¢ Are there penalties for breaches of these undertakings? ā€¢ Considering the size of these actors are any of these penalties even meaningful? 42
  • 43. Barriers to Entry ā€¢ Why is there one 1 very large Open DNS provider? ā€¢ Is it because the incumbent is raising the barriers of entry to all potential competitors? ā€¢ Unlikely, as there is no evidence that this is the case ā€¢ Or are there ā€œnaturalā€ barriers to entry? 43
  • 44. ā€œNaturalā€ Barriers to Entry ā€¢ The DNS economy is such a financial wasteland that few have a natural incentive to enter this market ā€¢ No one pays for queries ā€¢ Selling query logs can very damaging in terms of reputation and liability ā€“ particularly when you cannot get the usersā€™ informed consent to do so ā€¢ Selling NXDOMAIN substitution is also very damaging in terms of reputation ā€¢ It can be argued* that only someone with a massive presence is search has a commercial case for deploying a DNS resolver that is ā€œhonestā€ about the DNS (including NXDOMAIN) 44 * And some have from time to time
  • 46. Is all this a distraction? ā€¢ Itā€™s more likely that the shift of DNS functions into application realms using DoH services as an application function is a far greater threat to the current model of the DNS as a common single infrastructure ā€¢ Maybe the convergence of ā€¢ increased autonomy of applications in todayā€™s Internet ā€¢ the dominant position of Android ā€¢ The dominant position of Chrome poses a greater potential threat to the integrity of the name infrastructure of the Internet than the issue of recursive resolver use 46
  • 47. Thanks! Report on Resolver Use: https://stats.labs.apnic.net/rvrs