SlideShare a Scribd company logo
1 of 61
Download to read offline
Is the DNS ready for
IPv6?
Geoff Huston AM
APNIC Labs
IETF Best Current Practice –
BCP 91
RFC3901 – September 2004 “DNS IPv6 Transport Operational Guidelines”:
• Every recursive name server SHOULD be either IPv4-only or dual stack
• Every DNS zone SHOULD be served by at least one IPv4-reachable name server
IETF Best Current Practice –
BCP 91
RFC3901 – September 2004 “DNS IPv6 Transport Operational Guidelines”:
• Every recursive name server SHOULD be either IPv4-only or dual stack
• Every DNS zone SHOULD be served by at least one IPv4-reachable name server
Which is saying as an IPv6 Operational guideline “you better keep IPv4 going”
The RFC actually says very little about IPv6!
Proposed: 3901bis
Current IETF draft proposed to update RFC3901 by saying:
• It is RECOMMENDED that are least two NS for a zone are dual stack name
servers
• Every authoritative DNS zone SHOULD be served by at least one IPv6-
reachable authoritative name server
Which is saying as an IPv6 Operational guideline “time to take IPv6 seriously” and NOT saying
that servers need to keep IPv4 around– which is largely the opposite of the advice in RFC
3901!
The assumption behind 3901bis
• That IPv6 is now a mature and well understood technology, and using
IPv6 as the transport for the DNS is as efficient and as fast as using
IPv4
The assumption behind 3901bis
• That IPv6 is now a mature and well understood technology, and using
IPv6 as the transport for the DNS is as efficient and as fast as using
IPv4
Is this really true?
IPv6 and the DNS
How well is IPv6 supported in the DNS?
1. How does the DNS handle dual-stacked authoritative servers?
• Is there a “happy eyeballs” version of DNS server selection?
• Or is there a reverse bias to use IPv4?
2. If you placed authoritative servers on an IPv6-only service how
many users would be able to reach you?
3. And what about DNSSEC?
• How well does IPv6 support large UDP packets?
A word or two about “how” to
talk about the DNS
We really don’t understand what a “resolver” is!
It could be a single platform running an instance of DNS resolver code
It could be a collection of independent back-end systems with a load distributor
front end facing clients
It could be a hybrid collection where the back ends synchronise each other to
emulate a common cache
It is a stub, recursive, or forwarding resolver
A resolver may have 1 client or millions of clients or anything in between
When we talk about “resolvers” it’s challenging to understand exactly
what we are talking about!
Another word, this time about
“how” to talk about DNS queries
We don’t understand what a query is!
Which sounds silly, but the distributed resolution process causes a ‘fan out’ of
queries as part of the resolution process when a single query may cause a
number of ‘discovery’ queries to establish the identity of the authoritative
server(s) for the name
Resolvers all use their own timers for retransmission
Queries have no “hop count” or “resolver path” attached
there is no context to understand the reason for a query!
Queries have a life of their own
APNIC’s DNS Experimental Rig
Authoritative Server
Dual Stack
Recursive Resolver
Stub
Resolver
We instrument the
Authoritative Server
We insert “known”
DNS queries into the
stub resolver
• We use the ad network to “seed” DNS queries
• We make parts of the name unique to each measurement
That way the recursive resolvers have no cached data and are forced to query the
authoritative server
• We observe the recursive to authoritative query process by instrumenting the
authoritative server, and match experiment placement records to the server’s DNS
logs
Also, the DNS is VERY noisy!
There are a lot of gratuitous DNS queries
• Some 46% of qnames are queried 2 or
more times
• Some 30% are queried 3 or more times!
Dual Stack DNS
How well is IPv6 supported in the DNS?
1. How does the DNS handle dual-stacked authoritative servers?
• Is there a “happy eyeballs” version of DNS server selection?
• Or is there a reverse bias to use IPv4?
2. If you placed authoritative servers on an IPv6-only service how
many users would be able to reach you?
3. And what about DNSSEC?
• How well does IPv6 support large UDP packets?
Dual Stack DNS
A “happy eyeballs*” DNS approach would be
to prefer to use the IPv6 address of the
authoritative server in preference to the IPv4
address
A “reverse bias” DNS approach would be to
prefer to use the IPv4 address
Data collected Dec 23 – Jan 24 using 445M
domain names
IPv4 Only
43%
IPv6 Only
11%
IPv4 + IPv6
46%
Dual Stack DNS
A “happy eyeballs*” DNS approach would be
to prefer to use the IPv6 address of the
authoritative server in preference to the IPv4
address
A “reverse bias” DNS approach would be to
prefer to use the IPv4 address
Data collected Dec 23 – Jan 24 using 445M
domain names
IPv4 Only
43%
IPv6 Only
11%
IPv4 + IPv6
46%
Less than one half of all name resolution query sequences show both
protocols being used to query a name at the authoritative server
Dual Stack DNS
A “happy eyeballs” DNS approach
would be to prefer to use the IPv6
address of the authoritative server in
preference to the IPv4 address and
follow this initial query with a IPv4
query soon after
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
V6-V4 V4-V6 V6-V6 V4-V4
First 2 Queries
Happy Eyeballs?
V4 Only
V6 Only
V4-V6
V6-V4
Dual Stack DNS
A “happy eyeballs” DNS approach
would be minimise the delay between
the initial 2 queries
Which is observed in the data, but we
also see evidence of conventional DNS
timeout values of 370ms, 400ms,
800ms and 1 sec
Is the high repeat query count in the
first 50 ms due to resolver repeat or
due to query duplication across
multiple recursive resolvers?
Delay between first 2 Queries
Dual Stack DNS
How well is IPv6 supported in the DNS?
1. How does the DNS handle dual-stacked authoritative servers?
• Is there a “happy eyeballs” version of DNS server selection?
• Or is there a reverse bias to use IPv4?
2. If you placed authoritative servers on an IPv6-only service how
many users would be able to reach you?
3. And what about DNSSEC?
• How well does IPv6 support large UDP packets?
No!
Probably!
Dual Stack DNS
How well is IPv6 supported in the DNS?
1. How does the DNS handle dual-stacked authoritative servers?
• Is there a “happy eyeballs” version of DNS server selection?
• Or is there a reverse bias to use IPv4?
2. If you placed authoritative servers on an IPv6-only service how
many users would be able to reach you?
3. And what about DNSSEC?
• How well does IPv6 support large UDP packets?
No!
Probably!
Dual Stack vs IPv6 only DNS
No query – 35%
IPv6 – 65%
IPv6 Only Test
In this case the authoritative name server only
has an IPv6 address
Of all the clients that are presented with an
experiment (51M over 5 days) 65% of names
are seen asking for the experiment name if the
DNS server is reachable over IPv6 only
No query – 35%
IPv6 – 65%
Dual Stack vs IPv6 only DNS
IPv6 Only Test
Dual Stack
IPv4 Only
43%
IPv6 Only
11%
IPv4 + IPv6
46%
No query – 35%
IPv6 – 65%
Dual Stack vs IPv6 only DNS
IPv6 Only Test
Dual Stack
IPv4 Only
43%
IPv6 Only
11%
IPv4 + IPv6
46%
Dual Stack DNS
How well is IPv6 supported in the DNS?
1. How does the DNS handle dual-stacked authoritative servers?
• Is there a “happy eyeballs” version of DNS server selection?
• Or is there a reverse bias to use IPv4?
2. If you placed authoritative servers on an IPv6-only service how
many users would be able to reach you?
3. And what about DNSSEC?
• How well does IPv6 support large UDP packets?
No!
Probably!
Only 65%
Dual Stack DNS
How well is IPv6 supported in the DNS?
1. How does the DNS handle dual-stacked authoritative servers?
• Is there a “happy eyeballs” version of DNS server selection?
• Or is there a reverse bias to use IPv4?
2. If you placed authoritative servers on an IPv6-only service how
many users would be able to reach you?
3. And what about DNSSEC?
• How well does IPv6 support large UDP packets?
No!
Probably!
Only 55%
IPv6 and Packet Fragmentation
IPv6 made two major changes to IP’s handling of packet fragmentation:
• The fragmentation control header has been moved out of the IP
header to become an extension header
• In other words, the UDP / TCP protocol header is pushed further into the
packet and to find it you need to follow the header chain
• The IPv4 ‘Don’t Fragment’ bit is jammed on in IPv6
• In the case of path MTU issues IPv6 routers should not perform fragmentation
on the fly, but are required to pass an ICMPv6 PTB message back to the
packet’s sender
Who uses Fragmentation anyway?
• Well, the DNS is a good place to start looking!
Who uses large DNS packets
anyway?
• And the root zone DNS is a good place to start looking!
Who uses large DNS packets
anyway? .sl 3319
.pl 2193
.gdn 1954
.ve 1951
.uy 1951
.bg 1951
.xn--mgbx4cd0ab 1931
.africa 1897
.ad 1769
.ss 1715
.firmdale 1693
.xn--mgbah1a3hjkrd 1691
.xn--mgbt3dhd 1681
.ar 1675
.nowruz 1669
.beats 1667
.apple 1667
.shia 1665
.pars 1665
.tci 1663
.zm 1661
.td 1661
.si 1661
.na 1661
.ly 1661
.kw 1661
.ke 1661
.gy 1661
.lifestyle 1638
.living 1629
Size of dnssec-signed DNSKEY
response for some gtlds in
Nov-23
These folk do!
Who uses large DNS packets
anyway?
Some 300 gtlds
rely on
fragmented
UDP responses!
However…
UDP Fragmentation has its problems
• UDP trailing fragments in IPv4 and IPv6 may encounter fragment filtering
rules on firewalls in front of resolvers
• Large UDP packets in IPv6 may encounter path MTU mismatch problems, and
the ICMP6 Packet Too Big diagnostic message may be filtered.
Even if it is delivered, the host may not process the message due to the lack of verification
of the authenticity of the ICMP6 message.
Because the protocol is UDP, receipt of an ICMP6 message will not cause retransmission of
a re-framed packet.
• UDP fragments in IPv6 are implemented by Extension Headers. There is ample
evidence of deployment of IPv6 switching equipment that unilaterally discards IPv6
packets with extension headers
Is this a problem for today’s
IPv6 Internet?
• Can we measure the extent to which users might be affected with this
scenario of large DNS responses, DNS resolvers and IPv6?
Our Measurement Approach
We use an Online Ad platform to enroll endpoints to attempt to resolve
a set of DNS names:
• Each endpoint is provided with a unique name string (to eliminate the effects
of DNS caching)
• The DNS name is served from our authoritative servers
• Resolving the DNS name requires the user’s DNS resolvers to receive a
fragmented IPv6 packet
V6, the DNS and Fragmented UDP
Total number of tests (DNS over UDP over IPv6): 32,951,595
Failure Rate in receiving a large response: 18,557,838
IPv6 Fragmentation Failure Rate: 56%
Data gathered 20 Dec 2023 – 9 Jan 2024
V6, the DNS and Fragmented UDP
Total number of tests (DNS over UDP over IPv6): 32,951,595
Failure Rate in receiving a large response: 18,557,838
IPv6 Fragmentation Failure Rate: 56%
Data gathered 20 Dec 2023 – 9 Jan 2024
That’s awesomely bad!
What to do?
Accepting a future IPv6-only Internet means we are going to have to
take the problem of IPv6 Fragmentation seriously
• Because relying on IPv4 as a backup is a hack with an indeterminate future!
Which means that we need to figure out how to change the appalling
drop rate for fragmented IPv6 packets both in the DNS and in end-to-
end paths
Should we try and fix the network problem or try to work around it?
DNS and UDP
• The original DNS spec uses UDP with a maximum payload size of 512
octets (RFC 1035, sec 2.3.4)
• RFC2671 defined an Extension Mechanism that included a buffer size
parameter to permit DNS payloads in UDP larger than 512 (sec 2.3)
• RFC 6891 proposed a buffer size of 4,096 as a “starting point” (sec
6.2.5) and proposed a fallback to a non-fragmented size before using
truncation
• If the response cannot fit in the UDP payload the responder sets the
Truncation bit in its response, which signals to the querier that it
should retry using TCP
DNS UDP Responder
• If the response can fit within the EDNS Buffer size, then generate a
UDP packet and let the network (IPv4) or host (IPv6) fragment the
UDP packet as required
• But any received ICMPv6 Packet Too Big message will NOT cause re-
transmission!
• Otherwise set the TC bit
IPv6 and UDP
• IPv6 will not allow routers to forward fragment
• IPv6 relies on receiving a ICMP6 Packet Too Big message with a MTU
size
• But its UDP, so there is no ACK timers and no stored packet to retransmit and
no stored query to recompute the response
• All the original sender can do is take the returned MTU and store it as a
destination-specific MTU value that is locally cached for an interval in the
sending host’s forwarding table, and used for…
• An IPv6 sender must perform outgoing packet fragmentation, using
an inserted IPv6 Fragmentation Extension Header
IPv6 and UDP issues
• ICMP6 messages are often blocked
• ICMP6 messages cannot be validated
• Anycast may result in misdirected ICMP6 messages
• IPv6 Fragmented Packets are often dropped
• A lost response means that the querier has to timeout
• DNS timeout timers range from ~400ms to 1 second!
V6 Fragmentation Drop Rates
V6 Frag Drop is highly variable
What to do?
• Set authoritative servers and recursive resolvers to override the EDNS
Buffer Size in the query and respond with the TC bit set if the
response is > 1232 bytes ?
• Configure stub clients to use DoH ?
• Revive the Additional Truncated Response draft?
(https://datatracker.ietf.org/doc/html/draft-song-atr-large-resp-00)
What do the RFC’s say?
What do the RFC’s say?
What do the RFC’s say?
What do the RFC’s say?
This BCP is saying that using EDNS(0) in the
DNS to signal the capability of accepting large
fragmented DNS responses was unwise, and if a
host/application does not know the path MTU, it
should truncate at UDP at 1280 octets (and IPv4
should truncate at 512 octets!)
DON’T FRAGMENT!
What can we do about it?
Fix it!
Get all the deployed routers, switches and firewalls and related
network middleware to accept packets with IPv6 Fragmentation
Headers
What can we do about it?
Change it!
Change the way in which IPv6 manages IP fragmentation and the
use of Extension Headers as Fragmentation Control fields
What can we do about it?
Avoid it!
Change application behaviour to avoid the use of packet
fragmentation completely
Large DNS Responses and IPv6
Change the transport protocol?
• DNS over TCP by default
• DoT by default
• DoH
• DoQUIC
or
• Devise some new DNS framing protocol that uses multiple packets with
firewall-friendly packet and protocol headers instead of IP fragmentation
Large DNS Responses and IPv6
Change the application protocol behaviour?
• Perform UDP MTU discovery using EDNS(0) UDP Buffer Size variations as a
probe
• Shift Additional Records into additional explicit UDP query/response
transactions rather than bloating the original DNS response
• Add a truncated minimal UDP response to trail a fragmented response (ATR)
Truncate and failover to TCP
• Use an EDNS Buffer Size in queries to ensure that IPv6 responses are
never fragmented
• Large responses will be truncated
• The truncation should trigger the querier to perform an immediate
followup of the same query, using TCP
• Which means that we are probably looking at working around the
problem by changing the configuration of DNS queries and use an
EDNS buffer size of 1232 octets
See https://dnsflagday.net/2020/
DNS Flag Day 2020 Uptake
46% of IPv6 queries are still using 4096
Byte Buffer Size
69% of IPv6 queries are using a Buffer
Size greater than 1232
We know what we can do to make this work well, but we seem to be reluctant to actually do it!
Is the DNS ready for IPv6?
• Not yet!
Thanks!
Bonus Slides on Truncation
• Does Truncation “work”?
i.e.:
• Will resolvers ignore the answer section in UDP responses that have the
truncation bit set?
• Will resolvers always re-query using TCP?
More measurements
• Who reads the answer section in Truncated UDP responses?
• Does IPv6 make this better or worse?
DualStack V6-Only
Tests 67,469,670 92,606,626
xTC 33,026,054 46,303,113
xTC-noTCP 306,271 1,311,313
QueryTarget 78,777 6,718
Rate 0.239% 0.015%
Its pretty good!
• Very few resolvers read the answer section in truncated responses
Rank AS CC TC Count Sample Count Rate ASName
1 4837 CN 35,555 1,968,824 1.8% CHINAUNICOM Backbone
2 17816 CN 33,699 125,125 26.9% China UnicomGuangdong
3 4134 CN 2,607 2,879,125 0.1% CHINANETBackbone
Dual Stack:
Its pretty good!
• Very few resolvers read the answer section in truncated responses
Rank AS CC TC Count Sample Count Rate ASName
1 17882 MN 5,021 36,802 13.64% UniVision, Mongolia
2 17816 CN 957 108,012 0.89% China Unicom, Guandong, China
3 4837 CN 557 3,035,580 0.02% China Unicom, Backbone, China
4 36923 NG 495 36,923 1.34% SWIFTNG, Nigeria
5 4134 CN 444 5,586,273 0.01% ChinaNet, China
6 4538 CN 185 95,323 0.19% CERNET, China
7 4812 CN 93 996,884 0.01% Chinanet, China
IPv6-Only:
Who Can’t do TCP?
• What proportion of users sit behind non-TCP capable resolvers?
• Does IPv6 make this better or worse?
DualStack V6-Only
Tests 67,469,670 134,295,458
TC 62,471,679 92,581,430
TC-noTCP 562,334 2,612,150
NoQueryTarget 483,557 2,600,142
Rate 0.77% 2.81%
Who can’t do TCP?
• Dual Stack
Rank AS CC TC Count Sample Count Rate ASName
1 45609 IN 98,527 1,428,411 6.9% Bharti Airtel, India
2 7418 CL 96,826 128,305 75.5% Telefonica Chile
3 52341 CL 71,103 78,023 91.1% WOM Chile
4 17816 CN 36,285 125,125 29.0% China UnicomGuangdong, China
5 27995 CL 33,474 36,524 91.6% Claro Chile
6 4837 CN 32,273 1,968,824 1.6% China UnicomBackbone, China
7 6535 CL 15,841 17,331 91.4% Telmex Servicios, Chile
8 6849 UA 13,681 14,640 93.4% UKRTELNET, Ukraine
9 43197 TJ 10,097 11,801 85.6% PJSC TTmobile, Tajikistan
10 4134 CN 9,114 2,879,125 0.3% CHINANETBackbone, China
Who can’t do TCP?
• IPv6 only
Rank AS CC no-TCP Count TotalCount Rate ASName
1 55836 IN 582,358 11,803,186 4.93% Reliance Jio, India
2 45609 IN 305,030 4,334,161 7.04% Bharti Airtel, India
3 1221 AU 198,111 553,552 35.79% Telstra, Australia
4 4134 CN 154,605 5,586,273 2.77% Chinanet Backbine, China
5 45669 PK 141,906 165,545 85.72% Mobilink, Pakistan
6 22085 BR 130,686 185,642 70.40% Claro, Brazil
7 9808 CN 107,490 2,720,825 3.95% China Mobile, China
8 23693 ID 88,869 218,068 40.75% Telekomunikasi Selular, Indonesia

More Related Content

Similar to Is DNS ready for IPv6, presented by Geoff Huston at IETF 119

IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73APNIC
 
RIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsRIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsAPNIC
 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?APNIC
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS EvolutionAPNIC
 
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSDINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSAPNIC
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS PrivacyAPNIC
 
Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73APNIC
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Responsepm123008
 
OARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching RevisitedOARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching RevisitedAPNIC
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2srmanjuskp
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?APNIC
 
DNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we useDNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we useAPNIC
 
HKNOG 5.0 - NSEC caching
HKNOG 5.0 - NSEC cachingHKNOG 5.0 - NSEC caching
HKNOG 5.0 - NSEC cachingAPNIC
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff HustonAPNIC
 
Life Without IPv4: Tore Anderson, IPv6 guru, Redpill Linpro
Life Without IPv4: Tore Anderson, IPv6 guru, Redpill LinproLife Without IPv4: Tore Anderson, IPv6 guru, Redpill Linpro
Life Without IPv4: Tore Anderson, IPv6 guru, Redpill LinproIPv6no
 
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096APNIC
 
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Measuring the centralization of DNS resolution'  presentation by Geoff Huston...Measuring the centralization of DNS resolution'  presentation by Geoff Huston...
Measuring the centralization of DNS resolution' presentation by Geoff Huston...APNIC
 
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff HustonResolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff HustonAPNIC
 

Similar to Is DNS ready for IPv6, presented by Geoff Huston at IETF 119 (20)

IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73
 
RIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsRIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurements
 
Ventajas de IPv6
Ventajas de IPv6Ventajas de IPv6
Ventajas de IPv6
 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
 
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSDINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
 
Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
OARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching RevisitedOARC 31: NSEC Caching Revisited
OARC 31: NSEC Caching Revisited
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
DNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we useDNS-OARC 38: The resolvers we use
DNS-OARC 38: The resolvers we use
 
HKNOG 5.0 - NSEC caching
HKNOG 5.0 - NSEC cachingHKNOG 5.0 - NSEC caching
HKNOG 5.0 - NSEC caching
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
 
Life Without IPv4: Tore Anderson, IPv6 guru, Redpill Linpro
Life Without IPv4: Tore Anderson, IPv6 guru, Redpill LinproLife Without IPv4: Tore Anderson, IPv6 guru, Redpill Linpro
Life Without IPv4: Tore Anderson, IPv6 guru, Redpill Linpro
 
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
DNS-OARC-36: Measurement of DNSSEC Validation with RSA-4096
 
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
Measuring the centralization of DNS resolution'  presentation by Geoff Huston...Measuring the centralization of DNS resolution'  presentation by Geoff Huston...
Measuring the centralization of DNS resolution' presentation by Geoff Huston...
 
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff HustonResolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
Resolver concentration presentation for OARC 40 by Joao Damas and Geoff Huston
 

More from APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 

More from APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 

Recently uploaded

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Recently uploaded (20)

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

Is DNS ready for IPv6, presented by Geoff Huston at IETF 119

  • 1. Is the DNS ready for IPv6? Geoff Huston AM APNIC Labs
  • 2. IETF Best Current Practice – BCP 91 RFC3901 – September 2004 “DNS IPv6 Transport Operational Guidelines”: • Every recursive name server SHOULD be either IPv4-only or dual stack • Every DNS zone SHOULD be served by at least one IPv4-reachable name server
  • 3. IETF Best Current Practice – BCP 91 RFC3901 – September 2004 “DNS IPv6 Transport Operational Guidelines”: • Every recursive name server SHOULD be either IPv4-only or dual stack • Every DNS zone SHOULD be served by at least one IPv4-reachable name server Which is saying as an IPv6 Operational guideline “you better keep IPv4 going” The RFC actually says very little about IPv6!
  • 4. Proposed: 3901bis Current IETF draft proposed to update RFC3901 by saying: • It is RECOMMENDED that are least two NS for a zone are dual stack name servers • Every authoritative DNS zone SHOULD be served by at least one IPv6- reachable authoritative name server Which is saying as an IPv6 Operational guideline “time to take IPv6 seriously” and NOT saying that servers need to keep IPv4 around– which is largely the opposite of the advice in RFC 3901!
  • 5. The assumption behind 3901bis • That IPv6 is now a mature and well understood technology, and using IPv6 as the transport for the DNS is as efficient and as fast as using IPv4
  • 6. The assumption behind 3901bis • That IPv6 is now a mature and well understood technology, and using IPv6 as the transport for the DNS is as efficient and as fast as using IPv4 Is this really true?
  • 7. IPv6 and the DNS How well is IPv6 supported in the DNS? 1. How does the DNS handle dual-stacked authoritative servers? • Is there a “happy eyeballs” version of DNS server selection? • Or is there a reverse bias to use IPv4? 2. If you placed authoritative servers on an IPv6-only service how many users would be able to reach you? 3. And what about DNSSEC? • How well does IPv6 support large UDP packets?
  • 8. A word or two about “how” to talk about the DNS We really don’t understand what a “resolver” is! It could be a single platform running an instance of DNS resolver code It could be a collection of independent back-end systems with a load distributor front end facing clients It could be a hybrid collection where the back ends synchronise each other to emulate a common cache It is a stub, recursive, or forwarding resolver A resolver may have 1 client or millions of clients or anything in between When we talk about “resolvers” it’s challenging to understand exactly what we are talking about!
  • 9. Another word, this time about “how” to talk about DNS queries We don’t understand what a query is! Which sounds silly, but the distributed resolution process causes a ‘fan out’ of queries as part of the resolution process when a single query may cause a number of ‘discovery’ queries to establish the identity of the authoritative server(s) for the name Resolvers all use their own timers for retransmission Queries have no “hop count” or “resolver path” attached there is no context to understand the reason for a query! Queries have a life of their own
  • 10. APNIC’s DNS Experimental Rig Authoritative Server Dual Stack Recursive Resolver Stub Resolver We instrument the Authoritative Server We insert “known” DNS queries into the stub resolver • We use the ad network to “seed” DNS queries • We make parts of the name unique to each measurement That way the recursive resolvers have no cached data and are forced to query the authoritative server • We observe the recursive to authoritative query process by instrumenting the authoritative server, and match experiment placement records to the server’s DNS logs
  • 11. Also, the DNS is VERY noisy! There are a lot of gratuitous DNS queries • Some 46% of qnames are queried 2 or more times • Some 30% are queried 3 or more times!
  • 12. Dual Stack DNS How well is IPv6 supported in the DNS? 1. How does the DNS handle dual-stacked authoritative servers? • Is there a “happy eyeballs” version of DNS server selection? • Or is there a reverse bias to use IPv4? 2. If you placed authoritative servers on an IPv6-only service how many users would be able to reach you? 3. And what about DNSSEC? • How well does IPv6 support large UDP packets?
  • 13. Dual Stack DNS A “happy eyeballs*” DNS approach would be to prefer to use the IPv6 address of the authoritative server in preference to the IPv4 address A “reverse bias” DNS approach would be to prefer to use the IPv4 address Data collected Dec 23 – Jan 24 using 445M domain names IPv4 Only 43% IPv6 Only 11% IPv4 + IPv6 46%
  • 14. Dual Stack DNS A “happy eyeballs*” DNS approach would be to prefer to use the IPv6 address of the authoritative server in preference to the IPv4 address A “reverse bias” DNS approach would be to prefer to use the IPv4 address Data collected Dec 23 – Jan 24 using 445M domain names IPv4 Only 43% IPv6 Only 11% IPv4 + IPv6 46% Less than one half of all name resolution query sequences show both protocols being used to query a name at the authoritative server
  • 15. Dual Stack DNS A “happy eyeballs” DNS approach would be to prefer to use the IPv6 address of the authoritative server in preference to the IPv4 address and follow this initial query with a IPv4 query soon after 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% V6-V4 V4-V6 V6-V6 V4-V4 First 2 Queries Happy Eyeballs? V4 Only V6 Only V4-V6 V6-V4
  • 16. Dual Stack DNS A “happy eyeballs” DNS approach would be minimise the delay between the initial 2 queries Which is observed in the data, but we also see evidence of conventional DNS timeout values of 370ms, 400ms, 800ms and 1 sec Is the high repeat query count in the first 50 ms due to resolver repeat or due to query duplication across multiple recursive resolvers? Delay between first 2 Queries
  • 17. Dual Stack DNS How well is IPv6 supported in the DNS? 1. How does the DNS handle dual-stacked authoritative servers? • Is there a “happy eyeballs” version of DNS server selection? • Or is there a reverse bias to use IPv4? 2. If you placed authoritative servers on an IPv6-only service how many users would be able to reach you? 3. And what about DNSSEC? • How well does IPv6 support large UDP packets? No! Probably!
  • 18. Dual Stack DNS How well is IPv6 supported in the DNS? 1. How does the DNS handle dual-stacked authoritative servers? • Is there a “happy eyeballs” version of DNS server selection? • Or is there a reverse bias to use IPv4? 2. If you placed authoritative servers on an IPv6-only service how many users would be able to reach you? 3. And what about DNSSEC? • How well does IPv6 support large UDP packets? No! Probably!
  • 19. Dual Stack vs IPv6 only DNS No query – 35% IPv6 – 65% IPv6 Only Test In this case the authoritative name server only has an IPv6 address Of all the clients that are presented with an experiment (51M over 5 days) 65% of names are seen asking for the experiment name if the DNS server is reachable over IPv6 only
  • 20. No query – 35% IPv6 – 65% Dual Stack vs IPv6 only DNS IPv6 Only Test Dual Stack IPv4 Only 43% IPv6 Only 11% IPv4 + IPv6 46%
  • 21. No query – 35% IPv6 – 65% Dual Stack vs IPv6 only DNS IPv6 Only Test Dual Stack IPv4 Only 43% IPv6 Only 11% IPv4 + IPv6 46%
  • 22. Dual Stack DNS How well is IPv6 supported in the DNS? 1. How does the DNS handle dual-stacked authoritative servers? • Is there a “happy eyeballs” version of DNS server selection? • Or is there a reverse bias to use IPv4? 2. If you placed authoritative servers on an IPv6-only service how many users would be able to reach you? 3. And what about DNSSEC? • How well does IPv6 support large UDP packets? No! Probably! Only 65%
  • 23. Dual Stack DNS How well is IPv6 supported in the DNS? 1. How does the DNS handle dual-stacked authoritative servers? • Is there a “happy eyeballs” version of DNS server selection? • Or is there a reverse bias to use IPv4? 2. If you placed authoritative servers on an IPv6-only service how many users would be able to reach you? 3. And what about DNSSEC? • How well does IPv6 support large UDP packets? No! Probably! Only 55%
  • 24. IPv6 and Packet Fragmentation IPv6 made two major changes to IP’s handling of packet fragmentation: • The fragmentation control header has been moved out of the IP header to become an extension header • In other words, the UDP / TCP protocol header is pushed further into the packet and to find it you need to follow the header chain • The IPv4 ‘Don’t Fragment’ bit is jammed on in IPv6 • In the case of path MTU issues IPv6 routers should not perform fragmentation on the fly, but are required to pass an ICMPv6 PTB message back to the packet’s sender
  • 25. Who uses Fragmentation anyway? • Well, the DNS is a good place to start looking!
  • 26. Who uses large DNS packets anyway? • And the root zone DNS is a good place to start looking!
  • 27. Who uses large DNS packets anyway? .sl 3319 .pl 2193 .gdn 1954 .ve 1951 .uy 1951 .bg 1951 .xn--mgbx4cd0ab 1931 .africa 1897 .ad 1769 .ss 1715 .firmdale 1693 .xn--mgbah1a3hjkrd 1691 .xn--mgbt3dhd 1681 .ar 1675 .nowruz 1669 .beats 1667 .apple 1667 .shia 1665 .pars 1665 .tci 1663 .zm 1661 .td 1661 .si 1661 .na 1661 .ly 1661 .kw 1661 .ke 1661 .gy 1661 .lifestyle 1638 .living 1629 Size of dnssec-signed DNSKEY response for some gtlds in Nov-23 These folk do!
  • 28. Who uses large DNS packets anyway? Some 300 gtlds rely on fragmented UDP responses!
  • 29. However… UDP Fragmentation has its problems • UDP trailing fragments in IPv4 and IPv6 may encounter fragment filtering rules on firewalls in front of resolvers • Large UDP packets in IPv6 may encounter path MTU mismatch problems, and the ICMP6 Packet Too Big diagnostic message may be filtered. Even if it is delivered, the host may not process the message due to the lack of verification of the authenticity of the ICMP6 message. Because the protocol is UDP, receipt of an ICMP6 message will not cause retransmission of a re-framed packet. • UDP fragments in IPv6 are implemented by Extension Headers. There is ample evidence of deployment of IPv6 switching equipment that unilaterally discards IPv6 packets with extension headers
  • 30. Is this a problem for today’s IPv6 Internet? • Can we measure the extent to which users might be affected with this scenario of large DNS responses, DNS resolvers and IPv6?
  • 31. Our Measurement Approach We use an Online Ad platform to enroll endpoints to attempt to resolve a set of DNS names: • Each endpoint is provided with a unique name string (to eliminate the effects of DNS caching) • The DNS name is served from our authoritative servers • Resolving the DNS name requires the user’s DNS resolvers to receive a fragmented IPv6 packet
  • 32. V6, the DNS and Fragmented UDP Total number of tests (DNS over UDP over IPv6): 32,951,595 Failure Rate in receiving a large response: 18,557,838 IPv6 Fragmentation Failure Rate: 56% Data gathered 20 Dec 2023 – 9 Jan 2024
  • 33. V6, the DNS and Fragmented UDP Total number of tests (DNS over UDP over IPv6): 32,951,595 Failure Rate in receiving a large response: 18,557,838 IPv6 Fragmentation Failure Rate: 56% Data gathered 20 Dec 2023 – 9 Jan 2024 That’s awesomely bad!
  • 34. What to do? Accepting a future IPv6-only Internet means we are going to have to take the problem of IPv6 Fragmentation seriously • Because relying on IPv4 as a backup is a hack with an indeterminate future! Which means that we need to figure out how to change the appalling drop rate for fragmented IPv6 packets both in the DNS and in end-to- end paths Should we try and fix the network problem or try to work around it?
  • 35. DNS and UDP • The original DNS spec uses UDP with a maximum payload size of 512 octets (RFC 1035, sec 2.3.4) • RFC2671 defined an Extension Mechanism that included a buffer size parameter to permit DNS payloads in UDP larger than 512 (sec 2.3) • RFC 6891 proposed a buffer size of 4,096 as a “starting point” (sec 6.2.5) and proposed a fallback to a non-fragmented size before using truncation • If the response cannot fit in the UDP payload the responder sets the Truncation bit in its response, which signals to the querier that it should retry using TCP
  • 36. DNS UDP Responder • If the response can fit within the EDNS Buffer size, then generate a UDP packet and let the network (IPv4) or host (IPv6) fragment the UDP packet as required • But any received ICMPv6 Packet Too Big message will NOT cause re- transmission! • Otherwise set the TC bit
  • 37. IPv6 and UDP • IPv6 will not allow routers to forward fragment • IPv6 relies on receiving a ICMP6 Packet Too Big message with a MTU size • But its UDP, so there is no ACK timers and no stored packet to retransmit and no stored query to recompute the response • All the original sender can do is take the returned MTU and store it as a destination-specific MTU value that is locally cached for an interval in the sending host’s forwarding table, and used for… • An IPv6 sender must perform outgoing packet fragmentation, using an inserted IPv6 Fragmentation Extension Header
  • 38. IPv6 and UDP issues • ICMP6 messages are often blocked • ICMP6 messages cannot be validated • Anycast may result in misdirected ICMP6 messages • IPv6 Fragmented Packets are often dropped • A lost response means that the querier has to timeout • DNS timeout timers range from ~400ms to 1 second!
  • 40. V6 Frag Drop is highly variable
  • 41. What to do? • Set authoritative servers and recursive resolvers to override the EDNS Buffer Size in the query and respond with the TC bit set if the response is > 1232 bytes ? • Configure stub clients to use DoH ? • Revive the Additional Truncated Response draft? (https://datatracker.ietf.org/doc/html/draft-song-atr-large-resp-00)
  • 42. What do the RFC’s say?
  • 43. What do the RFC’s say?
  • 44. What do the RFC’s say?
  • 45. What do the RFC’s say? This BCP is saying that using EDNS(0) in the DNS to signal the capability of accepting large fragmented DNS responses was unwise, and if a host/application does not know the path MTU, it should truncate at UDP at 1280 octets (and IPv4 should truncate at 512 octets!) DON’T FRAGMENT!
  • 46. What can we do about it? Fix it! Get all the deployed routers, switches and firewalls and related network middleware to accept packets with IPv6 Fragmentation Headers
  • 47. What can we do about it? Change it! Change the way in which IPv6 manages IP fragmentation and the use of Extension Headers as Fragmentation Control fields
  • 48. What can we do about it? Avoid it! Change application behaviour to avoid the use of packet fragmentation completely
  • 49. Large DNS Responses and IPv6 Change the transport protocol? • DNS over TCP by default • DoT by default • DoH • DoQUIC or • Devise some new DNS framing protocol that uses multiple packets with firewall-friendly packet and protocol headers instead of IP fragmentation
  • 50. Large DNS Responses and IPv6 Change the application protocol behaviour? • Perform UDP MTU discovery using EDNS(0) UDP Buffer Size variations as a probe • Shift Additional Records into additional explicit UDP query/response transactions rather than bloating the original DNS response • Add a truncated minimal UDP response to trail a fragmented response (ATR)
  • 51. Truncate and failover to TCP • Use an EDNS Buffer Size in queries to ensure that IPv6 responses are never fragmented • Large responses will be truncated • The truncation should trigger the querier to perform an immediate followup of the same query, using TCP • Which means that we are probably looking at working around the problem by changing the configuration of DNS queries and use an EDNS buffer size of 1232 octets See https://dnsflagday.net/2020/
  • 52. DNS Flag Day 2020 Uptake 46% of IPv6 queries are still using 4096 Byte Buffer Size 69% of IPv6 queries are using a Buffer Size greater than 1232 We know what we can do to make this work well, but we seem to be reluctant to actually do it!
  • 53. Is the DNS ready for IPv6? • Not yet!
  • 55. Bonus Slides on Truncation • Does Truncation “work”? i.e.: • Will resolvers ignore the answer section in UDP responses that have the truncation bit set? • Will resolvers always re-query using TCP?
  • 56. More measurements • Who reads the answer section in Truncated UDP responses? • Does IPv6 make this better or worse? DualStack V6-Only Tests 67,469,670 92,606,626 xTC 33,026,054 46,303,113 xTC-noTCP 306,271 1,311,313 QueryTarget 78,777 6,718 Rate 0.239% 0.015%
  • 57. Its pretty good! • Very few resolvers read the answer section in truncated responses Rank AS CC TC Count Sample Count Rate ASName 1 4837 CN 35,555 1,968,824 1.8% CHINAUNICOM Backbone 2 17816 CN 33,699 125,125 26.9% China UnicomGuangdong 3 4134 CN 2,607 2,879,125 0.1% CHINANETBackbone Dual Stack:
  • 58. Its pretty good! • Very few resolvers read the answer section in truncated responses Rank AS CC TC Count Sample Count Rate ASName 1 17882 MN 5,021 36,802 13.64% UniVision, Mongolia 2 17816 CN 957 108,012 0.89% China Unicom, Guandong, China 3 4837 CN 557 3,035,580 0.02% China Unicom, Backbone, China 4 36923 NG 495 36,923 1.34% SWIFTNG, Nigeria 5 4134 CN 444 5,586,273 0.01% ChinaNet, China 6 4538 CN 185 95,323 0.19% CERNET, China 7 4812 CN 93 996,884 0.01% Chinanet, China IPv6-Only:
  • 59. Who Can’t do TCP? • What proportion of users sit behind non-TCP capable resolvers? • Does IPv6 make this better or worse? DualStack V6-Only Tests 67,469,670 134,295,458 TC 62,471,679 92,581,430 TC-noTCP 562,334 2,612,150 NoQueryTarget 483,557 2,600,142 Rate 0.77% 2.81%
  • 60. Who can’t do TCP? • Dual Stack Rank AS CC TC Count Sample Count Rate ASName 1 45609 IN 98,527 1,428,411 6.9% Bharti Airtel, India 2 7418 CL 96,826 128,305 75.5% Telefonica Chile 3 52341 CL 71,103 78,023 91.1% WOM Chile 4 17816 CN 36,285 125,125 29.0% China UnicomGuangdong, China 5 27995 CL 33,474 36,524 91.6% Claro Chile 6 4837 CN 32,273 1,968,824 1.6% China UnicomBackbone, China 7 6535 CL 15,841 17,331 91.4% Telmex Servicios, Chile 8 6849 UA 13,681 14,640 93.4% UKRTELNET, Ukraine 9 43197 TJ 10,097 11,801 85.6% PJSC TTmobile, Tajikistan 10 4134 CN 9,114 2,879,125 0.3% CHINANETBackbone, China
  • 61. Who can’t do TCP? • IPv6 only Rank AS CC no-TCP Count TotalCount Rate ASName 1 55836 IN 582,358 11,803,186 4.93% Reliance Jio, India 2 45609 IN 305,030 4,334,161 7.04% Bharti Airtel, India 3 1221 AU 198,111 553,552 35.79% Telstra, Australia 4 4134 CN 154,605 5,586,273 2.77% Chinanet Backbine, China 5 45669 PK 141,906 165,545 85.72% Mobilink, Pakistan 6 22085 BR 130,686 185,642 70.40% Claro, Brazil 7 9808 CN 107,490 2,720,825 3.95% China Mobile, China 8 23693 ID 88,869 218,068 40.75% Telekomunikasi Selular, Indonesia