From mir at ripe.net Mon Jul 11 16:02:21 2011 From: mir at ripe.net (Mirjam Kuehne) Date: Mon, 11 Jul 2011 16:02:21 +0200 Subject: [ncc-services-wg] Analysis of Increased Query Load on Root Name Servers In-Reply-To: <4E0B27C0.1030709@ripe.net> References: <4E0B27C0.1030709@ripe.net> Message-ID: <4E1B026D.2010606@ripe.net> [apologies for duplicates] Dear colleagues, We did some more analysis of the recent increase in query load on K-root and other root name servers. Please read on RIPE Labs: http://labs.ripe.net/Members/wnagele/analysis-of-increased-query-load-on-root-name-servers Kind Regards, Mirjam Kuehne RIPE NCC From dougb at dougbarton.us Tue Jul 12 02:41:03 2011 From: dougb at dougbarton.us (Doug Barton) Date: Mon, 11 Jul 2011 17:41:03 -0700 Subject: [ncc-services-wg] Re: [dns-wg] Analysis of Increased Query Load on Root Name Servers In-Reply-To: <4E1B026D.2010606@ripe.net> References: <4E0B27C0.1030709@ripe.net> <4E1B026D.2010606@ripe.net> Message-ID: <4E1B981F.20209@dougbarton.us> On 07/11/2011 07:02, Mirjam Kuehne wrote: > [apologies for duplicates] > > Dear colleagues, > > We did some more analysis of the recent increase in query load on K-root > and other root name servers. Please read on RIPE Labs: > > http://labs.ripe.net/Members/wnagele/analysis-of-increased-query-load-on-root-name-servers This analysis is interesting from the traffic standpoint, but doesn't seem to answer one of the questions that I had, which is what caused the sudden increase? Historically this kind of thing has happened in the case of a misconfiguration for the name service for a popular domain, but (unless I missed it, and if so apologies) the question of, "Was misconfigured?" isn't answered in this paper. I'm not (necessarily) asking you to "name and shame" the domain in question, but I still believe that it's an interesting question on several levels. Meanwhile congrats to the K staff for handling this issue so adroitly. Doug -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadth of IT experience, and depth of knowledge in the DNS. Yours for the right price. :) http://SupersetSolutions.com/ From emile.aben at ripe.net Tue Jul 12 09:20:51 2011 From: emile.aben at ripe.net (Emile Aben) Date: Tue, 12 Jul 2011 09:20:51 +0200 Subject: [ncc-services-wg] Re: [dns-wg] Analysis of Increased Query Load on Root Name Servers In-Reply-To: <4E1B981F.20209@dougbarton.us> References: <4E0B27C0.1030709@ripe.net> <4E1B026D.2010606@ripe.net> <4E1B981F.20209@dougbarton.us> Message-ID: <4E1BF5D3.6020302@ripe.net> On 12/07/2011 02:41, Doug Barton wrote: > On 07/11/2011 07:02, Mirjam Kuehne wrote: >> [apologies for duplicates] >> >> Dear colleagues, >> >> We did some more analysis of the recent increase in query load on K-root >> and other root name servers. Please read on RIPE Labs: >> >> http://labs.ripe.net/Members/wnagele/analysis-of-increased-query-load-on-root-name-servers > > This analysis is interesting from the traffic standpoint, but doesn't > seem to answer one of the questions that I had, which is what caused the > sudden increase? Historically this kind of thing has happened in the > case of a misconfiguration for the name service for a popular domain, > but (unless I missed it, and if so apologies) the question of, "Was > misconfigured?" isn't answered in this paper. Hi Doug, We don't have all the answers, but it appears not to be related to a misconfigured zone, the zone looked (and still looks) like this: .com. 7200 IN SOA ns1.. root.ns1..com. 20091027 28800 600 604800 86400 .com. 300 IN A .com. 300 IN A .com. 7200 IN NS ns1.. .com. 7200 IN NS ns2.. .com. 7200 IN NS ns3.. .com. 7200 IN NS ns4.. www..com. 300 IN A www..com. 300 IN A .com. 7200 IN SOA ns1.. root.ns1..com. 20091027 28800 600 604800 86400 As mentioned in the article, we have several indications that this was caused by a botnet. It is unlikely this was a reflector attack with spoofed source addresses, as there are some 60,000 unique source IPs per hour in the queries for this specific domain. For targeted spoofing I'd would expect this number to be very low, for random spoofing I'd expect this number would be far higher. If you have any clue or indication on things we could further investigate, let us know, here or on RIPE Labs. best regards, Emile Aben RIPE NCC From dougb at dougbarton.us Wed Jul 13 02:43:34 2011 From: dougb at dougbarton.us (Doug Barton) Date: Tue, 12 Jul 2011 17:43:34 -0700 Subject: [ncc-services-wg] Re: [dns-wg] Analysis of Increased Query Load on Root Name Servers In-Reply-To: <4E1BF5D3.6020302@ripe.net> References: <4E0B27C0.1030709@ripe.net> <4E1B026D.2010606@ripe.net> <4E1B981F.20209@dougbarton.us> <4E1BF5D3.6020302@ripe.net> Message-ID: <4E1CEA36.6010105@dougbarton.us> On 07/12/2011 00:20, Emile Aben wrote: > We don't have all the answers, but it appears not to be related to a > misconfigured zone Thank you for satisfying my idle curiosity. :) I did not mean to imply that your report was in any way deficient at describing what you think the problem was actually caused by. My curiosity about this particular issue was raised for 2 reasons, one being (as I said previously) history of previous incidents. The other is given that if this were a DDOS attempt it's a rather weak one (on several levels) I can't help finding that unlikely. (Which again, is not a criticism of your analysis, merely a disturbing lack of pieces falling neatly into previously-known patterns.) I did note this from your scrubbed zone file: .com. 7200 IN NS ns1.. .com. 7200 IN NS ns2.. .com. 7200 IN NS ns3.. .com. 7200 IN NS ns4.. Are we to conclude from that that is different from .com? If so, and is misconfigured somehow, that would start to look more like misconfiguration patterns that we've seen in the past; particularly if is not in COM, and therefore the COM zone has no glue for those hostnames. I also note that 2 hours seems to be a ridiculously short TTL for NS records, which would seem to put a little more weight on the "possible misconfiguration" side of the balance. One could imagine a moderately popular game site receiving the CN equivalent of being slashdotted, and previously-painless minor misconfigurations suddenly causing much larger problems. hth, Doug -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadth of IT experience, and depth of knowledge in the DNS. Yours for the right price. :) http://SupersetSolutions.com/ From emile.aben at ripe.net Wed Jul 13 11:32:49 2011 From: emile.aben at ripe.net (Emile Aben) Date: Wed, 13 Jul 2011 11:32:49 +0200 Subject: [ncc-services-wg] Re: [dns-wg] Analysis of Increased Query Load on Root Name Servers In-Reply-To: <4E1CEA36.6010105@dougbarton.us> References: <4E0B27C0.1030709@ripe.net> <4E1B026D.2010606@ripe.net> <4E1B981F.20209@dougbarton.us> <4E1BF5D3.6020302@ripe.net> <4E1CEA36.6010105@dougbarton.us> Message-ID: <4E1D6641.1060503@ripe.net> On 13/07/2011 02:43, Doug Barton wrote: > On 07/12/2011 00:20, Emile Aben wrote: >> We don't have all the answers, but it appears not to be related to a >> misconfigured zone > > Thank you for satisfying my idle curiosity. :) I did not mean to imply > that your report was in any way deficient at describing what you think > the problem was actually caused by. My curiosity about this particular > issue was raised for 2 reasons, one being (as I said previously) history > of previous incidents. The other is given that if this were a DDOS > attempt it's a rather weak one (on several levels) I can't help finding > that unlikely. (Which again, is not a criticism of your analysis, merely > a disturbing lack of pieces falling neatly into previously-known patterns.) I agree that this is a bit strange, my guess would be that this was a test of capabilities of some kind. Not too strange to pick the root-servers as a target, since it is relatively well instrumented. > I did note this from your scrubbed zone file: > > .com. 7200 IN NS ns1.. > .com. 7200 IN NS ns2.. > .com. 7200 IN NS ns3.. > .com. 7200 IN NS ns4.. > > Are we to conclude from that that is different from > .com? If so, and is misconfigured somehow, that would Yes, it was a different domain, not in COM. We asked folks that operate COM and they didn't see the same query-storm for this domain though. If these were all 'normal' resolvers dealing with a misconfigured zone, I'd expect them to follow the delegation chain. Also when spot-checking some 20 source IPs for these queries we didn't find these did any other queries to K-root then for things in .com. But again, we don't have the definite answer and are not excluding any possible explanation, so thanks for inquiring deeper into this. > start to look more like misconfiguration patterns that we've seen in the > past; particularly if is not in COM, and therefore the COM > zone has no glue for those hostnames. > > I also note that 2 hours seems to be a ridiculously short TTL for NS > records, which would seem to put a little more weight on the "possible > misconfiguration" side of the balance. One could imagine a moderately > popular game site receiving the CN equivalent of being slashdotted, and > previously-painless minor misconfigurations suddenly causing much larger > problems. I just looked at the query load for www..com on 20110628, and before 16:28 UTC (0:28 Chinese Standard time) we have 2 queries for this domain, then it all starts: #queries timestamp 1 1309252434 1 1309274472 8603 1309278521 9630 1309278522 11277 1309278523 14123 1309278524 12271 1309278525 12457 1309278526 12118 1309278527 12369 1309278528 12234 1309278529 12402 1309278530 12202 1309278531 12469 1309278532 12138 1309278533 12149 1309278534 ... (continues to be in 10-12kps range for a while) So either the misconfiguration started at around 16:28 UTC, or this wasn't a misconfiguration. The third possibility, already misconfigurated+CN-slashdotted, I think is not impossible but unlikely, both because of it being past midnight at the ASes that were a major source of queries, and the very sudden increase in load. regards, Emile Aben RIPE NCC From dougb at dougbarton.us Wed Jul 13 19:38:43 2011 From: dougb at dougbarton.us (Doug Barton) Date: Wed, 13 Jul 2011 10:38:43 -0700 Subject: [ncc-services-wg] Re: [dns-wg] Analysis of Increased Query Load on Root Name Servers In-Reply-To: <4E1D6641.1060503@ripe.net> References: <4E0B27C0.1030709@ripe.net> <4E1B026D.2010606@ripe.net> <4E1B981F.20209@dougbarton.us> <4E1BF5D3.6020302@ripe.net> <4E1CEA36.6010105@dougbarton.us> <4E1D6641.1060503@ripe.net> Message-ID: <4E1DD823.3000002@dougbarton.us> On 07/13/2011 02:32, Emile Aben wrote: > Yes, it was a different domain, not in COM. > We asked folks that operate COM and they didn't see the same query-storm > for this domain though. If these were all 'normal' resolvers dealing > with a misconfigured zone, I'd expect them to follow the delegation > chain. Also when spot-checking some 20 source IPs for these queries we > didn't find these did any other queries to K-root then for things in > .com. Interesting stuff! Thanks for once again indulging my curiosity. I always find it interesting when more data makes a problem muddier instead of clearer. :) Doug -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadth of IT experience, and depth of knowledge in the DNS. Yours for the right price. :) http://SupersetSolutions.com/ From mir at ripe.net Mon Jul 18 15:09:11 2011 From: mir at ripe.net (Mirjam Kuehne) Date: Mon, 18 Jul 2011 15:09:11 +0200 Subject: [ncc-services-wg] Assigning 32-bit AS Numbers Message-ID: <4E243077.8010500@ripe.net> [apologies for duplicates] Dear colleagues, The RIPE NCC has been assigning 32-bit Autonomous System Numbers for quite some time now. Please see some statistics and analysis on RIPE Labs: http://labs.ripe.net/Members/mirjam/assigning-32-bit-asns Kind Regards, Mirjam Kuehne RIPE NCC