Fragmentation, Truncation, and Timeouts: Are Large DNS Messages Falling to Bits?

PASSIVE AND ACTIVE MEASUREMENT, PAM 2021(2021)

引用 12|浏览17
暂无评分
摘要
The DNS provides one of the core services of the Internet, mapping applications and services to hosts. DNS employs both UDP and TCP as a transport protocol, and currently most DNS queries are sent over UDP. The problem with UDP is that large responses run the risk of not arriving at their destinations - which can ultimately lead to unreachability. However, it remains unclear how much of a problem these large DNS responses over UDP are in the wild. This is the focus on this paper: we analyze 164 billion queries/response pairs from more than 46k autonomous systems, covering three months (July 2019 and 2020, and Oct. 2020), collected at the authoritative servers of the .nl, the country-code top-level domain of the Netherlands. We show that fragmentation, and the problems that can follow fragmentation, rarely occur at such authoritative servers. Further, we demonstrate that DNS built-in defenses - use of truncation, EDNS0 buffer sizes, reduced responses and TCP fall back - are effective to reduce fragmentation. Last, we measure the uptake of the DNS flag day in 2020.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要