SlideShare a Scribd company logo
1 of 33
Download to read offline
Measuring ATR
Joao Damas
Geoff Huston
@apnic.net
May 2018
September 2017:
The Internet has a problem …
• Instead of evolving to be more flexible and more capable, it appears
that the Internet’s transport is becoming more ossified and more
inflexible in certain aspects
• One of the major issues here is the handling of large IP packets and IP
level packet fragmentation
• We are seeing a number of end-to-end paths on the network that no
longer support the carriage of fragmented IP datagrams
• We are concerned that this number might be getting larger, not
smaller
The Internet has a problem …
• What about the DNS?
• One application that is making increasing use of large UDP packets is the DNS
• This is generally associated with DNSSEC-signed responses (such as “dig
+dnssec DNSKEY org”) but large DNS responses can be generated in other
ways as well (such as “dig . ANY”)
• In the DNS we appear to be relying on the successful transmission of
fragmented UDP packets, but at the same time we see an increasing problem
with the coherence in network and host handling of fragmented IP packets,
particularly in IPv6
Changing the DNS?
• But don’t large DNS transactions use TCP anyway?
• In the original DNS specification only small (smaller than 512 octets)
responses are passed across UDP.
• Larger DNS responses are truncated and the truncation is intended to trigger
the client to re-query using TCP
• EDNS(0) allowed a client to signal a larger truncation size threshold, and
assumes that fragmented DNS is mostly reliable
• But what if it’s not that reliable?
What is “ATR”?
• It stands for “Additional Truncated Response”
Internet draft: draft-song-atr-large-resp-01
May 2018
Linjian (Davey) Song, Beijing Internet Institute
• It’s a hybrid response to noted problems in IPv4 and IPv6 over
handling of large UDP packets and IP fragmentation
• ATR adds an additional response packet to ‘trail’ a fragmented UDP
response
• The additional response is just the original query with the Truncated
bit set, and the sender delays this additional response packet by 10ms
The Intention of ATR
Today:
• If the client cannot receive large truncated responses then it will need
to timeout from the original query,
• Then re-query using more resolvers,
• Timeout on these queries
• Then re-query using a 512 octet EDNS(0) UDP buffersize
• Then get a truncated response
• Then re-query using TCP
The Intention of ATR
Today:
• If the client cannot receive large truncated responses then it will need
to timeout from the original query,
• Then re-query using more resolvers,
• Timeout on these queries
• Then requery using a 512 octet EDNS(0) UDP buffersize
• Then get a truncated response
• Then requery using TCP
within a few ms
ATR
The Intention of ATR
• When a UDP DNS response is fragmented by the server, then the
server will also send a delayed truncated UDP DNS response
The delay is proposed to be 10ms
• If the DNS client receives and reassembles the fragmented UDP
response the ensuing truncated response will be ignored
• If the fragmented response is lost due to fragmentation loss, then the
client will receive the short truncated response
• The truncation setting is intended to trigger the client to re-query
using TCP without further delay
ATR Operation
UDP DNS Query
Client Server
ATR Operation
UDP DNS Query
UDP DNS Response
(Fragmented)
Client Server
ATR Operation
UDP DNS Query
UDP DNS Response
(Fragmented)
UDP DNS Response
(Truncated)
10ms
Client Server
ATR Operation
UDP DNS Query
UDP DNS Response
(Fragmented)
UDP DNS Response
(Truncated)
10ms
Client Server
TCP Query and Response
What could possibly go wrong?
• Network level packet re-ordering may cause the shorter truncated
response packet to overtake the fragmented response, causing an
inflated TCP load, and the potential for TCP loss to be triggered
• Not every client DNS system supports using TCP to emit queries
ATR and Resolver Behaviour
Can’t Receive
Fragmented UDP
Can’t Use TCP
ATR will help
ATR won’t be of use, but it
shouldn’t matter
ATR won’t help
ATR and Resolver Behaviour
Can’t Receive
Fragmented UDP
Can’t Use TCP
How big are each of these pools?
What proportion of users are impacted?
ATR will help
ATR won’t be of use, but it
shouldn’t matter
ATR won’t help
Experiment Details
• Use 6 tests:
• 2 tests use ATR responses – one is DNS over IPv4, the other is DNS over IPv6
• 2 tests use only truncated responses – IPv4 and IPv6
• 2 tests use large fragmented UDP responses - IPv4 and IPv6
• Performed 55M experiments
Looking at Resolvers
We are looking at resolvers who demonstrated that they received
responses of each test type:
Protocol Resolvers ATR Large UDP TCP
IPv4 113,087 71.2% 60.1% 79.4%
IPv6 20,878 55.4% 50.0% 55.1%
Looking at Resolvers
We are looking at resolvers who demonstrated that they received
responses of each test type:
Protocol Resolvers Fail ATR Fail Large UDP Fail TCP
IPv4 113,087 28.8% 39.9% 20.6%
IPv6 20,878 44.6% 50.0% 44.9%
Inversely, lets report on the FAILURE rate of resolvers
Seriously?
• More than one third of the ”visible” IPv4 resolvers are incapable of
receiving a large fragmented packet
• And one half of the ”visible” IPv6 resolvers are incapable of receiving
a large fragmented packet
ASNs of IPv4 Resolvers that do not followup
when given a large UDP Response – Top 10
ASN Use Exp AS Name CC
AS9644 0.78% 447,019 SK Telecom KR
AS701 0.70% 400,798 UUNET - MCI Communications Services US
AS17853 0.62% 357,335 LGTELECOM KR
AS4766 0.59% 340,334 Korea Telecom KR
AS4134 0.47% 267,995 CHINANET-BACKBONE CN
AS31034 0.47% 267,478 ARUBA-ASN IT
AS3786 0.39% 225,296 DACOM Corporation KR
AS36692 0.38% 217,306 OPENDNS - OpenDNS US
AS3215 0.33% 189,810 Orange FR
AS812 0.30% 169,699 ROGERS COMMUNICATIONS CA
ASNs of IPv6 Resolvers that do not followup
when given a large UDP Response – Top 10
ASN Use Exp AS Name CC
AS15169 40.60% 10,006,596 Google US
AS5650 0.90% 221,493 Frontier Communications US
AS36692 0.84% 206,143 OpenDNS US
AS812 0.78% 193,073 Rogers Communications Canada CA
AS20057 0.46% 114,440 AT&T Mobility LLC US
AS3352 0.38% 92,925 TELEFONICA_DE_ESPANA ES
AS852 0.35% 85,043 TELUS Communications Inc. CA
AS55644 0.32% 80,032 Idea Cellular Limited IN
AS3320 0.25% 61,938 DTAG Internet service provider operations DE
AS4761 0.24% 60,019 INDOSAT-INP-AP INDOSAT Internet Network Provider ID
ASNs of IPv4 Resolvers that do not followup in TCP
when given a truncated UDP Response – Top 10
ASN Use Exp AS Name CC
AS9299 0.55% 252,653 Philippine Long Distance Telephone PH
AS24560 0.34% 155,908 Bharti Airtel IN
AS3352 0.29% 132,924 TELEFONICA_DE_ESPANA ES
AS9498 0.19% 84,754 BHARTI Airtel IN
AS9121 0.14% 61,879 TTNET TR
AS23944 0.13% 58,102 SKYBroadband PH
AS9644 0.11% 51,750 SK Telecom KR
AS24499 0.11% 51,108 Telenor Pakistan PK
AS3215 0.10% 43,614 Orange FR
AS23700 0.09% 39,697 Fastnet ID
ASNs of IPv6 Resolvers that do not followup in TCP
when given a truncated UDP Response – Top 10
ASN Use Exp AS Name CC
AS15169 4.15% 961,287 Google US
AS21928 1.72% 399,129 T-Mobile USA US
AS7922 1.57% 364,596 Comcast Cable US
AS3352 0.54% 126,146 TELEFONICA_DE_ESPANA ES
AS22773 0.38% 87,723 Cox Communications Inc. US
AS55644 0.35% 80,844 Idea Cellular Limited IN
AS20115 0.31% 71,831 Charter Communications US
AS20057 0.30% 70,518 AT&T Mobility US
AS6713 0.20% 46,196 IAM-AS MA
AS8151 0.20% 45,754 Uninet S.A. de C.V. MX
What’s the impact?
Counting resolvers is NOT the same as counting users!
• Failure in the DNS is often masked by having multiple resolvers in the
clients local configuration
• And the distribution of users to visible recursive resolvers is heavily
skewed (10,000 resolvers by IP address handle the DNS queries of
some 90% of all end users)
• To assess the user impact let’s look at the results by counting user
level success / failure
Looking at Users - Failure Probabilities
IPv4
UDP Frag: 12.5%
TCP: 4.0%
ATR 3.9%
IPv6
UDP Frag: 20.8%
TCP: 8.4%
ATR 6.5%
ATR and Resolver Behaviour – IPv4
Can’t Receive
Fragmented UDP
Can’t Use TCP
ATR will help
ATR won’t be of use, but it
shouldn’t matter
ATR won’t help
12.5% 4.0%
8.6% 3.9% 0.1%
ATR and Resolver Behaviour – IPv4 IPv6
Can’t Receive
Fragmented UDP
Can’t Use TCP
ATR will help
ATR won’t be of use, but it
shouldn’t matter
ATR won’t help
12.5% 4.0%
20.8%
14.3% 6.5% 1.9%
8.4%
8.6% 3.9% 0.1%
ATR Impact: Net Change in User Failure Rates
IPv4
Fragged UDP Loss: 12.5%
ATR Loss Rate: 3.9%
IPv6
Fragged UDP Loss: 20.8%
ATR Loss Rate: 6.5%
Why use ATR?
• Allows those resolvers that can receive large fragmented UDP packets
to do so without being pushed into using TCP
• In this case the trailing truncated packet is ignored
(or, at worst, generates an ICMP Port Unreachable message back to the server)
• Faster resolution when fragmented UDP responses are blocked
• The ATR switchover to TCP happens immediately rather than waiting for local
timeouts to perform EDNS(0) UDP Buffer Size hunting to trigger a truncated
response
• Less time to resolve, fewer packets to resolve
Why NOT use ATR?
• Large UDP responses are used in DDOS attacks - adding an additional
packet to the response adds to the DDOS amplification factor
• The trailing UDP packet may generate ICMP Port Unreachable messages
back to the server
(This IMCP message occurs about at a rate of approximately 1 in 5 responses in our
experiments)
• Potential DDOS vector for the server
(unless the server limits the queue of delayed packets to some arbitrary ceiling)
• Potential re-ordering of the responses in flight may cause an unnecessary
delay and an additional TCP local component
(This can be reduced by using a longer delay, but too long a delay will allow for clients to requery)
• One more straw to add to the back of the DNS camel!
ATR Assessment
• Is this level of benefit worth the additional server and traffic load
when sending large responses?
• Is this load smaller than resolver hunting in response to packet drop?
• Is the faster fallback to TCP for large responses a significant benefit?
• Do we have any better ideas about how to cope with large responses
in the DNS?
Thanks!

More Related Content

What's hot

Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Congestion control
Congestion controlCongestion control
Congestion controlNithin Raj
 
Congestion control and quality of services
Congestion control and quality of servicesCongestion control and quality of services
Congestion control and quality of servicesJawad Ghumman
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networksrapatil
 
RIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsRIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsAPNIC
 
RSVP-TE Point-to-Multipoint
RSVP-TE Point-to-MultipointRSVP-TE Point-to-Multipoint
RSVP-TE Point-to-MultipointMetaswitch NTD
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3Seung-Bum Lee
 
Congestion control
Congestion control Congestion control
Congestion control arkaarka3
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of serviceSatya P. Joshi
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic CharacterizationIsmail Mukiibi
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersChika Yoshimura
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)Sri Safrina
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcpsamarai_apoc
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services HayderThary
 

What's hot (20)

Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control and quality of services
Congestion control and quality of servicesCongestion control and quality of services
Congestion control and quality of services
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
RIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurementsRIPE 78: IPv6 reliability measurements
RIPE 78: IPv6 reliability measurements
 
RSVP-TE Point-to-Multipoint
RSVP-TE Point-to-MultipointRSVP-TE Point-to-Multipoint
RSVP-TE Point-to-Multipoint
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
Congestion control
Congestion control Congestion control
Congestion control
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 

Similar to RIPE 76: Measuring ATR

Measuring ATR: IETF 101
Measuring ATR: IETF 101Measuring ATR: IETF 101
Measuring ATR: IETF 101APNIC
 
OARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server SystemOARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server SystemAPNIC
 
DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020APNIC
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsGerardo Pardo-Castellote
 
This is computer network class Select the statement that is correct- D.pdf
This is computer network class Select the statement that is correct- D.pdfThis is computer network class Select the statement that is correct- D.pdf
This is computer network class Select the statement that is correct- D.pdfEricvtJFraserr
 
IETF 100: Surviving IPv6 fragmentation
IETF 100: Surviving IPv6 fragmentationIETF 100: Surviving IPv6 fragmentation
IETF 100: Surviving IPv6 fragmentationAPNIC
 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?APNIC
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingRyan Furlough, BSCPE CPAS
 
Telehouse Enhanced Connect slide share
Telehouse Enhanced Connect  slide shareTelehouse Enhanced Connect  slide share
Telehouse Enhanced Connect slide shareTelehouse Europe
 
(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014
(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014
(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014Amazon Web Services
 
OpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyOpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyCourtland Smith
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comULLPTT
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.comULLPTT
 
Ccna interview questions
Ccna interview questions Ccna interview questions
Ccna interview questions Hub4Tech.com
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m Agus Awaludin
 

Similar to RIPE 76: Measuring ATR (20)

Measuring ATR: IETF 101
Measuring ATR: IETF 101Measuring ATR: IETF 101
Measuring ATR: IETF 101
 
OARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server SystemOARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server System
 
DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020DNS-OARC 34: Measuring DNS Flag Day 2020
DNS-OARC 34: Measuring DNS Flag Day 2020
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
 
This is computer network class Select the statement that is correct- D.pdf
This is computer network class Select the statement that is correct- D.pdfThis is computer network class Select the statement that is correct- D.pdf
This is computer network class Select the statement that is correct- D.pdf
 
IETF 100: Surviving IPv6 fragmentation
IETF 100: Surviving IPv6 fragmentationIETF 100: Surviving IPv6 fragmentation
IETF 100: Surviving IPv6 fragmentation
 
Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?Are we really ready to turn off IPv4?
Are we really ready to turn off IPv4?
 
6761 8-realtime
6761 8-realtime6761 8-realtime
6761 8-realtime
 
Network
NetworkNetwork
Network
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
VOIP QOS
VOIP QOSVOIP QOS
VOIP QOS
 
Telehouse Enhanced Connect slide share
Telehouse Enhanced Connect  slide shareTelehouse Enhanced Connect  slide share
Telehouse Enhanced Connect slide share
 
(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014
(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014
(WEB401) Optimizing Your Web Server on AWS | AWS re:Invent 2014
 
OpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyOpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform Technology
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
Ccna interview questions
Ccna interview questions Ccna interview questions
Ccna interview questions
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 

More from APNIC

Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 

More from APNIC (20)

Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 

Recently uploaded

一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsrahman018755
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirtrahman018755
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样AS
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxthinamazinyo
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理SS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书F
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxi191686
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Dewi Agency
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理A
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理AS
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 

Recently uploaded (20)

一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 

RIPE 76: Measuring ATR

  • 1. Measuring ATR Joao Damas Geoff Huston @apnic.net May 2018
  • 3. The Internet has a problem … • Instead of evolving to be more flexible and more capable, it appears that the Internet’s transport is becoming more ossified and more inflexible in certain aspects • One of the major issues here is the handling of large IP packets and IP level packet fragmentation • We are seeing a number of end-to-end paths on the network that no longer support the carriage of fragmented IP datagrams • We are concerned that this number might be getting larger, not smaller
  • 4. The Internet has a problem … • What about the DNS? • One application that is making increasing use of large UDP packets is the DNS • This is generally associated with DNSSEC-signed responses (such as “dig +dnssec DNSKEY org”) but large DNS responses can be generated in other ways as well (such as “dig . ANY”) • In the DNS we appear to be relying on the successful transmission of fragmented UDP packets, but at the same time we see an increasing problem with the coherence in network and host handling of fragmented IP packets, particularly in IPv6
  • 5. Changing the DNS? • But don’t large DNS transactions use TCP anyway? • In the original DNS specification only small (smaller than 512 octets) responses are passed across UDP. • Larger DNS responses are truncated and the truncation is intended to trigger the client to re-query using TCP • EDNS(0) allowed a client to signal a larger truncation size threshold, and assumes that fragmented DNS is mostly reliable • But what if it’s not that reliable?
  • 6. What is “ATR”? • It stands for “Additional Truncated Response” Internet draft: draft-song-atr-large-resp-01 May 2018 Linjian (Davey) Song, Beijing Internet Institute • It’s a hybrid response to noted problems in IPv4 and IPv6 over handling of large UDP packets and IP fragmentation • ATR adds an additional response packet to ‘trail’ a fragmented UDP response • The additional response is just the original query with the Truncated bit set, and the sender delays this additional response packet by 10ms
  • 7. The Intention of ATR Today: • If the client cannot receive large truncated responses then it will need to timeout from the original query, • Then re-query using more resolvers, • Timeout on these queries • Then re-query using a 512 octet EDNS(0) UDP buffersize • Then get a truncated response • Then re-query using TCP
  • 8. The Intention of ATR Today: • If the client cannot receive large truncated responses then it will need to timeout from the original query, • Then re-query using more resolvers, • Timeout on these queries • Then requery using a 512 octet EDNS(0) UDP buffersize • Then get a truncated response • Then requery using TCP within a few ms ATR
  • 9. The Intention of ATR • When a UDP DNS response is fragmented by the server, then the server will also send a delayed truncated UDP DNS response The delay is proposed to be 10ms • If the DNS client receives and reassembles the fragmented UDP response the ensuing truncated response will be ignored • If the fragmented response is lost due to fragmentation loss, then the client will receive the short truncated response • The truncation setting is intended to trigger the client to re-query using TCP without further delay
  • 10. ATR Operation UDP DNS Query Client Server
  • 11. ATR Operation UDP DNS Query UDP DNS Response (Fragmented) Client Server
  • 12. ATR Operation UDP DNS Query UDP DNS Response (Fragmented) UDP DNS Response (Truncated) 10ms Client Server
  • 13. ATR Operation UDP DNS Query UDP DNS Response (Fragmented) UDP DNS Response (Truncated) 10ms Client Server TCP Query and Response
  • 14. What could possibly go wrong? • Network level packet re-ordering may cause the shorter truncated response packet to overtake the fragmented response, causing an inflated TCP load, and the potential for TCP loss to be triggered • Not every client DNS system supports using TCP to emit queries
  • 15. ATR and Resolver Behaviour Can’t Receive Fragmented UDP Can’t Use TCP ATR will help ATR won’t be of use, but it shouldn’t matter ATR won’t help
  • 16. ATR and Resolver Behaviour Can’t Receive Fragmented UDP Can’t Use TCP How big are each of these pools? What proportion of users are impacted? ATR will help ATR won’t be of use, but it shouldn’t matter ATR won’t help
  • 17. Experiment Details • Use 6 tests: • 2 tests use ATR responses – one is DNS over IPv4, the other is DNS over IPv6 • 2 tests use only truncated responses – IPv4 and IPv6 • 2 tests use large fragmented UDP responses - IPv4 and IPv6 • Performed 55M experiments
  • 18. Looking at Resolvers We are looking at resolvers who demonstrated that they received responses of each test type: Protocol Resolvers ATR Large UDP TCP IPv4 113,087 71.2% 60.1% 79.4% IPv6 20,878 55.4% 50.0% 55.1%
  • 19. Looking at Resolvers We are looking at resolvers who demonstrated that they received responses of each test type: Protocol Resolvers Fail ATR Fail Large UDP Fail TCP IPv4 113,087 28.8% 39.9% 20.6% IPv6 20,878 44.6% 50.0% 44.9% Inversely, lets report on the FAILURE rate of resolvers
  • 20. Seriously? • More than one third of the ”visible” IPv4 resolvers are incapable of receiving a large fragmented packet • And one half of the ”visible” IPv6 resolvers are incapable of receiving a large fragmented packet
  • 21. ASNs of IPv4 Resolvers that do not followup when given a large UDP Response – Top 10 ASN Use Exp AS Name CC AS9644 0.78% 447,019 SK Telecom KR AS701 0.70% 400,798 UUNET - MCI Communications Services US AS17853 0.62% 357,335 LGTELECOM KR AS4766 0.59% 340,334 Korea Telecom KR AS4134 0.47% 267,995 CHINANET-BACKBONE CN AS31034 0.47% 267,478 ARUBA-ASN IT AS3786 0.39% 225,296 DACOM Corporation KR AS36692 0.38% 217,306 OPENDNS - OpenDNS US AS3215 0.33% 189,810 Orange FR AS812 0.30% 169,699 ROGERS COMMUNICATIONS CA
  • 22. ASNs of IPv6 Resolvers that do not followup when given a large UDP Response – Top 10 ASN Use Exp AS Name CC AS15169 40.60% 10,006,596 Google US AS5650 0.90% 221,493 Frontier Communications US AS36692 0.84% 206,143 OpenDNS US AS812 0.78% 193,073 Rogers Communications Canada CA AS20057 0.46% 114,440 AT&T Mobility LLC US AS3352 0.38% 92,925 TELEFONICA_DE_ESPANA ES AS852 0.35% 85,043 TELUS Communications Inc. CA AS55644 0.32% 80,032 Idea Cellular Limited IN AS3320 0.25% 61,938 DTAG Internet service provider operations DE AS4761 0.24% 60,019 INDOSAT-INP-AP INDOSAT Internet Network Provider ID
  • 23. ASNs of IPv4 Resolvers that do not followup in TCP when given a truncated UDP Response – Top 10 ASN Use Exp AS Name CC AS9299 0.55% 252,653 Philippine Long Distance Telephone PH AS24560 0.34% 155,908 Bharti Airtel IN AS3352 0.29% 132,924 TELEFONICA_DE_ESPANA ES AS9498 0.19% 84,754 BHARTI Airtel IN AS9121 0.14% 61,879 TTNET TR AS23944 0.13% 58,102 SKYBroadband PH AS9644 0.11% 51,750 SK Telecom KR AS24499 0.11% 51,108 Telenor Pakistan PK AS3215 0.10% 43,614 Orange FR AS23700 0.09% 39,697 Fastnet ID
  • 24. ASNs of IPv6 Resolvers that do not followup in TCP when given a truncated UDP Response – Top 10 ASN Use Exp AS Name CC AS15169 4.15% 961,287 Google US AS21928 1.72% 399,129 T-Mobile USA US AS7922 1.57% 364,596 Comcast Cable US AS3352 0.54% 126,146 TELEFONICA_DE_ESPANA ES AS22773 0.38% 87,723 Cox Communications Inc. US AS55644 0.35% 80,844 Idea Cellular Limited IN AS20115 0.31% 71,831 Charter Communications US AS20057 0.30% 70,518 AT&T Mobility US AS6713 0.20% 46,196 IAM-AS MA AS8151 0.20% 45,754 Uninet S.A. de C.V. MX
  • 25. What’s the impact? Counting resolvers is NOT the same as counting users! • Failure in the DNS is often masked by having multiple resolvers in the clients local configuration • And the distribution of users to visible recursive resolvers is heavily skewed (10,000 resolvers by IP address handle the DNS queries of some 90% of all end users) • To assess the user impact let’s look at the results by counting user level success / failure
  • 26. Looking at Users - Failure Probabilities IPv4 UDP Frag: 12.5% TCP: 4.0% ATR 3.9% IPv6 UDP Frag: 20.8% TCP: 8.4% ATR 6.5%
  • 27. ATR and Resolver Behaviour – IPv4 Can’t Receive Fragmented UDP Can’t Use TCP ATR will help ATR won’t be of use, but it shouldn’t matter ATR won’t help 12.5% 4.0% 8.6% 3.9% 0.1%
  • 28. ATR and Resolver Behaviour – IPv4 IPv6 Can’t Receive Fragmented UDP Can’t Use TCP ATR will help ATR won’t be of use, but it shouldn’t matter ATR won’t help 12.5% 4.0% 20.8% 14.3% 6.5% 1.9% 8.4% 8.6% 3.9% 0.1%
  • 29. ATR Impact: Net Change in User Failure Rates IPv4 Fragged UDP Loss: 12.5% ATR Loss Rate: 3.9% IPv6 Fragged UDP Loss: 20.8% ATR Loss Rate: 6.5%
  • 30. Why use ATR? • Allows those resolvers that can receive large fragmented UDP packets to do so without being pushed into using TCP • In this case the trailing truncated packet is ignored (or, at worst, generates an ICMP Port Unreachable message back to the server) • Faster resolution when fragmented UDP responses are blocked • The ATR switchover to TCP happens immediately rather than waiting for local timeouts to perform EDNS(0) UDP Buffer Size hunting to trigger a truncated response • Less time to resolve, fewer packets to resolve
  • 31. Why NOT use ATR? • Large UDP responses are used in DDOS attacks - adding an additional packet to the response adds to the DDOS amplification factor • The trailing UDP packet may generate ICMP Port Unreachable messages back to the server (This IMCP message occurs about at a rate of approximately 1 in 5 responses in our experiments) • Potential DDOS vector for the server (unless the server limits the queue of delayed packets to some arbitrary ceiling) • Potential re-ordering of the responses in flight may cause an unnecessary delay and an additional TCP local component (This can be reduced by using a longer delay, but too long a delay will allow for clients to requery) • One more straw to add to the back of the DNS camel!
  • 32. ATR Assessment • Is this level of benefit worth the additional server and traffic load when sending large responses? • Is this load smaller than resolver hunting in response to packet drop? • Is the faster fallback to TCP for large responses a significant benefit? • Do we have any better ideas about how to cope with large responses in the DNS?