Who’s knocking? Profiling recursive resolvers on authoritative name servers
Their caching properties are particularly useful for speeding up searches
Chose your color
Frequently visited
Frequently asked questions
The Whois is an easy-to-use tool for checking the availability of a .nl domain name. If the domain name is already taken, you can see who has registered it.
On the page looking up a domain name you will find more information about what a domain name is, how the Whois works and how the privacy of personal data is protected. Alternatively, you can go straight to look for a domain name via the Whois.
To get your domain name transferred, you need the token (unique ID number) for your domain name. Your existing registrar has the token and is obliged to give it to you within five days, if you ask for it. The procedure for changing your registrar is described on the page transferring your domain name.
To update the contact details associated with your domain name, you need to contact your registrar. Read more about updating contact details.
When a domain name is cancelled, we aren't told the reason, so we can't tell you. You'll need to ask your registrar. The advantage of quarantine is that, if a name's cancelled by mistake, you can always get it back.
One common reason is that the contract between you and your registrar says you've got to renew the registration every year. If you haven't set up automatic renewal and you don't renew manually, the registration will expire.
Wanneer je een klacht hebt over of een geschil met je registrar dan zijn er verschillende mogelijkheden om tot een oplossing te komen. Hierover lees je meer op pagina klacht over registrar. SIDN heeft geen formele klachtenprocedure voor het behandelen van een klacht over jouw registrar.
Would you like to be able to register domain names for customers or for your own organisation by dealing directly with SIDN? If so, you can become a .nl registrar. Read more about the conditions and how to apply for registrar status on the page becoming a registrar.
Their caching properties are particularly useful for speeding up searches
Recursive resolvers are often overlooked when it comes to their role and importance in the DNS (Domain Name System). Also known as DNS recursors, they act as middlemen between clients and DNS name servers — asking around the internet in search of the answers to client queries. Their caching properties are particularly useful for speeding up such searches.
Resolvers can serve different client bases, ranging from end users who want to visit their favourite video streaming websites to scripts that crawl the internet for marketing reasons. Knowing which resolvers are most suitable for serving their main clients would allow operators to understand how they should set up their server infrastructures to optimise interaction with those resolvers. It would also be useful if we could combine our classification data with other signals, such as RFC 8145, to identify important resolvers that don’t have the correct DNSSEC trust anchors configured, because the prevalence of such resolvers was problematic in the run-up to the last root KSK rollover. Like our colleagues at .nz, we at SIDN Labs are working on a project that involves the classification of recursive resolvers to increase our understanding of such issues. The main difference between our project and the .nz project is that we are trying to go beyond differentiating ‘real’ recursive resolvers from other resolvers — that is to say those used only by monitoring tools. Our intention is to label various different kinds of resolver, such as cloud providers, ISPs and so on. We are halfway through our research, but wanted to share some early results and collect feedback from the community with this blog post.
We want to classify recursive resolvers based on query data collected on the .nl name servers. In principle, however, data collected on any large authoritative name server should be adequate. We’re collecting queries and responses from two of our four name servers and storing them in our Hadoop-based warehouse. Feature selection is highly important — resolvers follow different patterns when querying .nl domain names. For example, while 82 per cent of the queries sent by 20 per cent of resolvers relate to IPv4 (A) or IPv6 (AAAA) addresses, some resolvers query almost exclusively for NS records. We have used such differences to select 22 features that we think are beneficial for analysis. Some features, such as the share of A-record queries, are straightforward; others need some pre-processing. For example, one of our assumptions is that ISPs’ resolvers are well maintained and adopt new standards promptly. For instance, we are also trying to detect whether resolvers support the privacy-enhancing standard QNAME minimisation. We have collected data on 22 distinctive features of nearly 1.4 million unique resolvers over the course of a single day. We have also created a ground truth dataset consisting of Autonomous System Numbers (ASNs) for known ISPs, hosting companies, cloud providers and so on. Creating this ground truth allows us to measure the accuracy of the clustering algorithms.
Figure 1 — Share of queries asking for the A records of domain names. Figure 1 shows how resolvers have distinctive query features. We can see that the IP addresses of TransIP, which is in the ‘hosting companies’ set within our ground truth, show the most unique behaviour, not only in relation to query type A, but also in relation to numerous other features in the dataset. Such distinctive behaviour on the part of hosting companies has enabled great accuracy to be achieved in the clustering phase. We ran various clustering algorithms, resulting in the successful identification of numerous hosting companies. However, we were unable to clearly distinguish other types of resolver. We think that, in some cases, clustering might be affected by noise in the dataset; for example, not every IP in an ISP’s AS is necessarily a recursive resolver serving end users.
No exact method has yet been defined for classifying recursive resolvers. However, our research observations to date enable us to conclude with some confidence that it is possible to classify recursive resolvers. Our next steps are to evaluate more features with a view to improving the classifier. Feedback and/or ideas on how we should go about that are welcome.
This blogpost first appeared on apnic.net.
Article by:
Share this article