ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a...

36
Anycast vs. DDoS The Nov. 2015 DNS Root Event Presented by Ricardo de Oliveira Schmidt October 25, 2016 Madrid, Spain Presentation copyright © 2016 by Ricardo de Oliveira Schmidt

Transcript of ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a...

Page 1: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Anycast vs. DDoSThe Nov. 2015 DNS Root Event

Presented by

Ricardo de Oliveira Schmidt

October 25, 2016 Madrid, Spain

Presentation copyright © 2016 by Ricardo de Oliveira Schmidt

Page 2: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Reference:

Anycast vs. DDoS: Evaluating the November 2015 DNS Root Event

Giovane C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei and Cristian Hesselman

In: ACM Internet Measurement Conference (IMC), 2016, Santa Monica, USA. Technical Report ISI-TR-2016-708, USC/Information Sciences Institute, May 2016

• http://www.isi.edu/~johnh/PAPERS/Moura16a.pdf

Page 3: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

Page 4: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

?

?

? ?

Page 5: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

?

?

? ?

Page 6: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Big and getting bigger2012: 100 Gb/s 2016: 100 Gb/s is common, >1 Tb/s is possible

Easy and getting easier2012: many botnets with 1000+ nodes 2016: DDoS-as-a-service (Booters) offer few Gb/s @ US$ 5

Frequent and getting frequent-er2002: the October 30 DNS Root event 2016: 3 recent big attacks (2015-11-30, 2015-12-01, 2016-06-25)

Distributed Denial of Service

Page 7: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

New record!

665 Gb/s!!!

Page 8: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

New record!

665 Gb/s!!!

Even Akamai "gave up"

Page 9: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

New record!

665 Gb/s!!!

Even Akamai "gave up"

"Someone has a botnet with capabilities we haven't seen before" Martin McKeay, Akamai

Page 10: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Big and getting bigger2012: 100 Gb/s 2016: 100 Gb/s is common, >1 Tb/s is possible

Easy and getting easier2012: many botnets with 1000+ nodes 2016: DDoS-as-a-service (Booters) offer few Gb/s @ US$ 5

Frequent and getting frequent-er2002: the October 30 DNS Root event 2016: 3 recent big attacks (2015-11-30, 2015-12-01, 2016-06-25)

Distributed Denial of Service

Page 11: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

More than 150,000 DDoS

in two years with profit of US$ 600,000

vDos homepage

Page 12: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Big and getting bigger2012: 100 Gb/s 2016: 100 Gb/s is common, >1 Tb/s is possible

Easy and getting easier2012: many botnets with 1000+ nodes 2016: DDoS-as-a-service (Booters) offer few Gb/s @ US$ 5

Frequent and getting frequent-er2002: the October 30 DNS Root event 2016: 3 recent big attacks (2015-11-30, 2015-12-01, 2016-06-25)

Distributed Denial of Service

Page 13: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

Image copyrights © thehackernews.com

Page 14: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

Image copyrights © thehackernews.com

"Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec"

Swati Khandelwal, thehackernews.com

Page 15: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

Image copyrights © thehackernews.com

"Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec"

Swati Khandelwal, thehackernews.com

"Root DNS servers DDoS'ed: was it a show off?" Yuri Ilyin, Kaspersky

Page 16: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Distributed Denial of Service

Image copyrights © thehackernews.com

"Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec"

Swati Khandelwal, thehackernews.com

"Root DNS servers DDoS'ed: was it a show off?" Yuri Ilyin, Kaspersky

"Someone Is Learning How to Take Down the Internet" Bruce Schneier, Schneier on Security

Page 17: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

DDoS attack on the Root DNS

Peak of 35+ Gb/s 5 million queries/sec Impact was moderate

Thanks to the redundancy of the whole system

The Nov. 30 Event

Page 18: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Root DNS

section observation

§2.2 design choices under stress are withdraw or absorb;best depends on attackers vs. capacity per catchment

§3.1 event was at likely 35Gb/s (50Mq/s, an upper bound),resulting in 150Gb/s reply tra�c

§3.2 letters saw minimal to severe loss (1% to 95%)§3.3 loss was not uniform across each letter’s anycast sites;

overall loss does not predict user-observed loss at sites§3.4 some users “flip” to other sites;

others stick to sometimes overloaded sites§3.5 at some sites, some servers su↵ered disproportionately§3.6 some collateral damage occurred to co-located services

not directly under attack

Table 1: Key observations in this paper.

providing a service that adapts to DDoS attacks (suchas Akamai [28], Cloudflare, and others). Yet the specificimpact of DDoS on real infrastructure has not widelybeen reported, often because commercial infrastructureis proprietary.

The DNS is a common service, and the root serversare a fundamental, high-profile, and publicly visible ser-vice that have been subject to DoS attacks in the past.As a public service, they are monitored [45] and striveto self-report their performance. Perhaps unique amongmany large services, the Root DNS service is operatedby 12 di↵erent organizations, with di↵erent implemen-tations and infrastructure. Although the internals ofeach implementation are not public, some details (suchas the number of anycast sites) are.

To evaluate the e↵ects of DoS attacks on real-worldinfrastructure, we analyze two specific events: the RootDNS events of Nov. and Dec. 2015 (see §2.3 for dis-cussion and references). We investigate how the DDoSattack a↵ected reachability and performance of the any-cast deployments. This paper is the first to explorethe response of real infrastructure across several levels,from specific anycast services (§3.2), physical sites ofthose services (§3.3), and of individual servers (§3.5).An important consequence of high load on sites is rout-ing changes, as users“flip” from one site to another aftera site becomes overloaded (§3.4). Table 1 summarizesour key observations from these studies.

Although we consider only two specific events, we ex-plore their e↵ects on 13 di↵erent DNS deployments ofvarying size and capacity. From the considerable varia-tion in response across these deployments we identify aset of potential responses, first in theory (§2.2) and thenin practice (§3). Exploration of additional attacks, andof the interplay of IP anycast and site select at otherlayers (for example, in Bing [15]) is future work.

The main contribution of this paper is the first eval-

uation of several IP anycast services under stress with

public data. Anycast is in wide use and commercial op-erators have been subject to repeated attacks, some ofwhich have been reported [42, 43, 49, 58, 17, 50, 4],but the details of those attacks are often withheld as

(recursive resolverand its root.hints)

Root letters

(unique IPanycast addr.)

Sites

(unique locationand BGP route)

Servers

(internalload balancing)

user

a b c ... k l m

s1 ... s33

r1 ... rn

Figure 1: Root DNS structure, terminology, and mech-anisms in use at each level.

proprietary. We demonstrate that in large anycast in-stances, site failures can occur even if the service as awhole continues to operate. Anycast can both absorb

attack tra�c inside sites, and also withdraw routes toshift both good and bad tra�c to other sites. We ex-plore these policy choices in the context of a real-worldattack, and show that site flips do not necessarily help

when the new site is also overloaded, or when the shift oftra�c overloads it. Finally, we show evidence of collat-eral damage (§3.6) on services near the attacks. Theseresults and policies can be used by anycast operators toguide management of their infrastructure. Finally, thechallenges we show suggest potential future research inimproving routing adaptation under stress and provi-sioning anycast to tolerate attacks.

2. BACKGROUND AND DATASETSBefore studying anycast services under attack, we

first summarize how IP anycast works. We describethe events a↵ecting the Root DNS service on Nov. 30and Dec. 1, 2015, and the datasets we use to study theseevents.

2.1 Anycast Background and Terminol-ogy

We next briefly review how IP anycast and the RootDNS service works. The Root DNS service is imple-mented with several mechanisms operating at di↵erentlevels (Figure 1): a root.hints file to bootstrap, mul-tiple IP services, often anycast; BGP routing in eachanycast server; and often multiple servers at each site.

The Root DNS is implemented by 13 separate DNSservices (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. Theseare called the 13 DNS Root Letter Services (or just the“Root Letters” for short), since each is assigned a letterfrom A to M and identified as<letter>.root-servers.net.The letters are operated by 12 independent organiza-tions (Verisign operates both A and J), and each letterhas a di↵erent architecture, an intentional diversity de-signed to provide robustness. This diversity happensto provide a rich natural environment that allows us to

Page 19: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Root DNS

section observation

§2.2 design choices under stress are withdraw or absorb;best depends on attackers vs. capacity per catchment

§3.1 event was at likely 35Gb/s (50Mq/s, an upper bound),resulting in 150Gb/s reply tra�c

§3.2 letters saw minimal to severe loss (1% to 95%)§3.3 loss was not uniform across each letter’s anycast sites;

overall loss does not predict user-observed loss at sites§3.4 some users “flip” to other sites;

others stick to sometimes overloaded sites§3.5 at some sites, some servers su↵ered disproportionately§3.6 some collateral damage occurred to co-located services

not directly under attack

Table 1: Key observations in this paper.

providing a service that adapts to DDoS attacks (suchas Akamai [28], Cloudflare, and others). Yet the specificimpact of DDoS on real infrastructure has not widelybeen reported, often because commercial infrastructureis proprietary.

The DNS is a common service, and the root serversare a fundamental, high-profile, and publicly visible ser-vice that have been subject to DoS attacks in the past.As a public service, they are monitored [45] and striveto self-report their performance. Perhaps unique amongmany large services, the Root DNS service is operatedby 12 di↵erent organizations, with di↵erent implemen-tations and infrastructure. Although the internals ofeach implementation are not public, some details (suchas the number of anycast sites) are.

To evaluate the e↵ects of DoS attacks on real-worldinfrastructure, we analyze two specific events: the RootDNS events of Nov. and Dec. 2015 (see §2.3 for dis-cussion and references). We investigate how the DDoSattack a↵ected reachability and performance of the any-cast deployments. This paper is the first to explorethe response of real infrastructure across several levels,from specific anycast services (§3.2), physical sites ofthose services (§3.3), and of individual servers (§3.5).An important consequence of high load on sites is rout-ing changes, as users“flip” from one site to another aftera site becomes overloaded (§3.4). Table 1 summarizesour key observations from these studies.

Although we consider only two specific events, we ex-plore their e↵ects on 13 di↵erent DNS deployments ofvarying size and capacity. From the considerable varia-tion in response across these deployments we identify aset of potential responses, first in theory (§2.2) and thenin practice (§3). Exploration of additional attacks, andof the interplay of IP anycast and site select at otherlayers (for example, in Bing [15]) is future work.

The main contribution of this paper is the first eval-

uation of several IP anycast services under stress with

public data. Anycast is in wide use and commercial op-erators have been subject to repeated attacks, some ofwhich have been reported [42, 43, 49, 58, 17, 50, 4],but the details of those attacks are often withheld as

(recursive resolverand its root.hints)

Root letters

(unique IPanycast addr.)

Sites

(unique locationand BGP route)

Servers

(internalload balancing)

user

a b c ... k l m

s1 ... s33

r1 ... rn

Figure 1: Root DNS structure, terminology, and mech-anisms in use at each level.

proprietary. We demonstrate that in large anycast in-stances, site failures can occur even if the service as awhole continues to operate. Anycast can both absorb

attack tra�c inside sites, and also withdraw routes toshift both good and bad tra�c to other sites. We ex-plore these policy choices in the context of a real-worldattack, and show that site flips do not necessarily help

when the new site is also overloaded, or when the shift oftra�c overloads it. Finally, we show evidence of collat-eral damage (§3.6) on services near the attacks. Theseresults and policies can be used by anycast operators toguide management of their infrastructure. Finally, thechallenges we show suggest potential future research inimproving routing adaptation under stress and provi-sioning anycast to tolerate attacks.

2. BACKGROUND AND DATASETSBefore studying anycast services under attack, we

first summarize how IP anycast works. We describethe events a↵ecting the Root DNS service on Nov. 30and Dec. 1, 2015, and the datasets we use to study theseevents.

2.1 Anycast Background and Terminol-ogy

We next briefly review how IP anycast and the RootDNS service works. The Root DNS service is imple-mented with several mechanisms operating at di↵erentlevels (Figure 1): a root.hints file to bootstrap, mul-tiple IP services, often anycast; BGP routing in eachanycast server; and often multiple servers at each site.

The Root DNS is implemented by 13 separate DNSservices (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. Theseare called the 13 DNS Root Letter Services (or just the“Root Letters” for short), since each is assigned a letterfrom A to M and identified as<letter>.root-servers.net.The letters are operated by 12 independent organiza-tions (Verisign operates both A and J), and each letterhas a di↵erent architecture, an intentional diversity de-signed to provide robustness. This diversity happensto provide a rich natural environment that allows us to

Horizontal distributionMultiple letters Multiple operators

Page 20: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Root DNS

section observation

§2.2 design choices under stress are withdraw or absorb;best depends on attackers vs. capacity per catchment

§3.1 event was at likely 35Gb/s (50Mq/s, an upper bound),resulting in 150Gb/s reply tra�c

§3.2 letters saw minimal to severe loss (1% to 95%)§3.3 loss was not uniform across each letter’s anycast sites;

overall loss does not predict user-observed loss at sites§3.4 some users “flip” to other sites;

others stick to sometimes overloaded sites§3.5 at some sites, some servers su↵ered disproportionately§3.6 some collateral damage occurred to co-located services

not directly under attack

Table 1: Key observations in this paper.

providing a service that adapts to DDoS attacks (suchas Akamai [28], Cloudflare, and others). Yet the specificimpact of DDoS on real infrastructure has not widelybeen reported, often because commercial infrastructureis proprietary.

The DNS is a common service, and the root serversare a fundamental, high-profile, and publicly visible ser-vice that have been subject to DoS attacks in the past.As a public service, they are monitored [45] and striveto self-report their performance. Perhaps unique amongmany large services, the Root DNS service is operatedby 12 di↵erent organizations, with di↵erent implemen-tations and infrastructure. Although the internals ofeach implementation are not public, some details (suchas the number of anycast sites) are.

To evaluate the e↵ects of DoS attacks on real-worldinfrastructure, we analyze two specific events: the RootDNS events of Nov. and Dec. 2015 (see §2.3 for dis-cussion and references). We investigate how the DDoSattack a↵ected reachability and performance of the any-cast deployments. This paper is the first to explorethe response of real infrastructure across several levels,from specific anycast services (§3.2), physical sites ofthose services (§3.3), and of individual servers (§3.5).An important consequence of high load on sites is rout-ing changes, as users“flip” from one site to another aftera site becomes overloaded (§3.4). Table 1 summarizesour key observations from these studies.

Although we consider only two specific events, we ex-plore their e↵ects on 13 di↵erent DNS deployments ofvarying size and capacity. From the considerable varia-tion in response across these deployments we identify aset of potential responses, first in theory (§2.2) and thenin practice (§3). Exploration of additional attacks, andof the interplay of IP anycast and site select at otherlayers (for example, in Bing [15]) is future work.

The main contribution of this paper is the first eval-

uation of several IP anycast services under stress with

public data. Anycast is in wide use and commercial op-erators have been subject to repeated attacks, some ofwhich have been reported [42, 43, 49, 58, 17, 50, 4],but the details of those attacks are often withheld as

(recursive resolverand its root.hints)

Root letters

(unique IPanycast addr.)

Sites

(unique locationand BGP route)

Servers

(internalload balancing)

user

a b c ... k l m

s1 ... s33

r1 ... rn

Figure 1: Root DNS structure, terminology, and mech-anisms in use at each level.

proprietary. We demonstrate that in large anycast in-stances, site failures can occur even if the service as awhole continues to operate. Anycast can both absorb

attack tra�c inside sites, and also withdraw routes toshift both good and bad tra�c to other sites. We ex-plore these policy choices in the context of a real-worldattack, and show that site flips do not necessarily help

when the new site is also overloaded, or when the shift oftra�c overloads it. Finally, we show evidence of collat-eral damage (§3.6) on services near the attacks. Theseresults and policies can be used by anycast operators toguide management of their infrastructure. Finally, thechallenges we show suggest potential future research inimproving routing adaptation under stress and provi-sioning anycast to tolerate attacks.

2. BACKGROUND AND DATASETSBefore studying anycast services under attack, we

first summarize how IP anycast works. We describethe events a↵ecting the Root DNS service on Nov. 30and Dec. 1, 2015, and the datasets we use to study theseevents.

2.1 Anycast Background and Terminol-ogy

We next briefly review how IP anycast and the RootDNS service works. The Root DNS service is imple-mented with several mechanisms operating at di↵erentlevels (Figure 1): a root.hints file to bootstrap, mul-tiple IP services, often anycast; BGP routing in eachanycast server; and often multiple servers at each site.

The Root DNS is implemented by 13 separate DNSservices (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. Theseare called the 13 DNS Root Letter Services (or just the“Root Letters” for short), since each is assigned a letterfrom A to M and identified as<letter>.root-servers.net.The letters are operated by 12 independent organiza-tions (Verisign operates both A and J), and each letterhas a di↵erent architecture, an intentional diversity de-signed to provide robustness. This diversity happensto provide a rich natural environment that allows us to

Vertical distributionMultiple sites Multiple servers

Page 21: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Measurement data: Built-in periodical CHAOS queries @Atlas RSSAC-002 data BGPmon

Measurement Data

Page 22: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the Attack

section observation

§2.2 design choices under stress are withdraw or absorb;best depends on attackers vs. capacity per catchment

§3.1 event was at likely 35Gb/s (50Mq/s, an upper bound),resulting in 150Gb/s reply tra�c

§3.2 letters saw minimal to severe loss (1% to 95%)§3.3 loss was not uniform across each letter’s anycast sites;

overall loss does not predict user-observed loss at sites§3.4 some users “flip” to other sites;

others stick to sometimes overloaded sites§3.5 at some sites, some servers su↵ered disproportionately§3.6 some collateral damage occurred to co-located services

not directly under attack

Table 1: Key observations in this paper.

providing a service that adapts to DDoS attacks (suchas Akamai [28], Cloudflare, and others). Yet the specificimpact of DDoS on real infrastructure has not widelybeen reported, often because commercial infrastructureis proprietary.

The DNS is a common service, and the root serversare a fundamental, high-profile, and publicly visible ser-vice that have been subject to DoS attacks in the past.As a public service, they are monitored [45] and striveto self-report their performance. Perhaps unique amongmany large services, the Root DNS service is operatedby 12 di↵erent organizations, with di↵erent implemen-tations and infrastructure. Although the internals ofeach implementation are not public, some details (suchas the number of anycast sites) are.

To evaluate the e↵ects of DoS attacks on real-worldinfrastructure, we analyze two specific events: the RootDNS events of Nov. and Dec. 2015 (see §2.3 for dis-cussion and references). We investigate how the DDoSattack a↵ected reachability and performance of the any-cast deployments. This paper is the first to explorethe response of real infrastructure across several levels,from specific anycast services (§3.2), physical sites ofthose services (§3.3), and of individual servers (§3.5).An important consequence of high load on sites is rout-ing changes, as users“flip” from one site to another aftera site becomes overloaded (§3.4). Table 1 summarizesour key observations from these studies.

Although we consider only two specific events, we ex-plore their e↵ects on 13 di↵erent DNS deployments ofvarying size and capacity. From the considerable varia-tion in response across these deployments we identify aset of potential responses, first in theory (§2.2) and thenin practice (§3). Exploration of additional attacks, andof the interplay of IP anycast and site select at otherlayers (for example, in Bing [15]) is future work.

The main contribution of this paper is the first eval-

uation of several IP anycast services under stress with

public data. Anycast is in wide use and commercial op-erators have been subject to repeated attacks, some ofwhich have been reported [42, 43, 49, 58, 17, 50, 4],but the details of those attacks are often withheld as

(recursive resolverand its root.hints)

Root letters

(unique IPanycast addr.)

Sites

(unique locationand BGP route)

Servers

(internalload balancing)

user

a b c ... k l m

s1 ... s33

r1 ... rn

Figure 1: Root DNS structure, terminology, and mech-anisms in use at each level.

proprietary. We demonstrate that in large anycast in-stances, site failures can occur even if the service as awhole continues to operate. Anycast can both absorb

attack tra�c inside sites, and also withdraw routes toshift both good and bad tra�c to other sites. We ex-plore these policy choices in the context of a real-worldattack, and show that site flips do not necessarily help

when the new site is also overloaded, or when the shift oftra�c overloads it. Finally, we show evidence of collat-eral damage (§3.6) on services near the attacks. Theseresults and policies can be used by anycast operators toguide management of their infrastructure. Finally, thechallenges we show suggest potential future research inimproving routing adaptation under stress and provi-sioning anycast to tolerate attacks.

2. BACKGROUND AND DATASETSBefore studying anycast services under attack, we

first summarize how IP anycast works. We describethe events a↵ecting the Root DNS service on Nov. 30and Dec. 1, 2015, and the datasets we use to study theseevents.

2.1 Anycast Background and Terminol-ogy

We next briefly review how IP anycast and the RootDNS service works. The Root DNS service is imple-mented with several mechanisms operating at di↵erentlevels (Figure 1): a root.hints file to bootstrap, mul-tiple IP services, often anycast; BGP routing in eachanycast server; and often multiple servers at each site.

The Root DNS is implemented by 13 separate DNSservices (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. Theseare called the 13 DNS Root Letter Services (or just the“Root Letters” for short), since each is assigned a letterfrom A to M and identified as<letter>.root-servers.net.The letters are operated by 12 independent organiza-tions (Verisign operates both A and J), and each letterhas a di↵erent architecture, an intentional diversity de-signed to provide robustness. This diversity happensto provide a rich natural environment that allows us to

What was the impact at individual letters?

Page 23: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

What was the impact?

Problems on reachability!

Most letters suffered a bit (E, F, I, J, K) a lot (B, C, G, H)

Did not see attack traffic D, L, M

0 2000

9000

num

ber o

f VPs

with

suc

cess

ful q

uerie

s

B C

0

5000

E F

1000

9000

G H

0

45007000

I J

0

6000

9000

0 5 10 15 20 25 30 35 40 45hours after 2015-11-30t00:00 UTC

K

0 5 10 15 20 25 30 35 40 45

A D L M

The Impact of the Attack

Page 24: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

What was the impact?

For those that still see service... ...performance problems ... 6x higher delay for G

0

50

100

150

200

250

300

350

0 5 10 15 20 25 30 35 40 45

media

n R

TT

(m

s)

hours after 2015-11-30t00:00 UTC

B-RootC-RootG-RootH-RootK-Root

B-Root

C-Root

G-Root

H-Root

K-Root

The Impact of the Attack

Page 25: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the Attack

section observation

§2.2 design choices under stress are withdraw or absorb;best depends on attackers vs. capacity per catchment

§3.1 event was at likely 35Gb/s (50Mq/s, an upper bound),resulting in 150Gb/s reply tra�c

§3.2 letters saw minimal to severe loss (1% to 95%)§3.3 loss was not uniform across each letter’s anycast sites;

overall loss does not predict user-observed loss at sites§3.4 some users “flip” to other sites;

others stick to sometimes overloaded sites§3.5 at some sites, some servers su↵ered disproportionately§3.6 some collateral damage occurred to co-located services

not directly under attack

Table 1: Key observations in this paper.

providing a service that adapts to DDoS attacks (suchas Akamai [28], Cloudflare, and others). Yet the specificimpact of DDoS on real infrastructure has not widelybeen reported, often because commercial infrastructureis proprietary.

The DNS is a common service, and the root serversare a fundamental, high-profile, and publicly visible ser-vice that have been subject to DoS attacks in the past.As a public service, they are monitored [45] and striveto self-report their performance. Perhaps unique amongmany large services, the Root DNS service is operatedby 12 di↵erent organizations, with di↵erent implemen-tations and infrastructure. Although the internals ofeach implementation are not public, some details (suchas the number of anycast sites) are.

To evaluate the e↵ects of DoS attacks on real-worldinfrastructure, we analyze two specific events: the RootDNS events of Nov. and Dec. 2015 (see §2.3 for dis-cussion and references). We investigate how the DDoSattack a↵ected reachability and performance of the any-cast deployments. This paper is the first to explorethe response of real infrastructure across several levels,from specific anycast services (§3.2), physical sites ofthose services (§3.3), and of individual servers (§3.5).An important consequence of high load on sites is rout-ing changes, as users“flip” from one site to another aftera site becomes overloaded (§3.4). Table 1 summarizesour key observations from these studies.

Although we consider only two specific events, we ex-plore their e↵ects on 13 di↵erent DNS deployments ofvarying size and capacity. From the considerable varia-tion in response across these deployments we identify aset of potential responses, first in theory (§2.2) and thenin practice (§3). Exploration of additional attacks, andof the interplay of IP anycast and site select at otherlayers (for example, in Bing [15]) is future work.

The main contribution of this paper is the first eval-

uation of several IP anycast services under stress with

public data. Anycast is in wide use and commercial op-erators have been subject to repeated attacks, some ofwhich have been reported [42, 43, 49, 58, 17, 50, 4],but the details of those attacks are often withheld as

(recursive resolverand its root.hints)

Root letters

(unique IPanycast addr.)

Sites

(unique locationand BGP route)

Servers

(internalload balancing)

user

a b c ... k l m

s1 ... s33

r1 ... rn

Figure 1: Root DNS structure, terminology, and mech-anisms in use at each level.

proprietary. We demonstrate that in large anycast in-stances, site failures can occur even if the service as awhole continues to operate. Anycast can both absorb

attack tra�c inside sites, and also withdraw routes toshift both good and bad tra�c to other sites. We ex-plore these policy choices in the context of a real-worldattack, and show that site flips do not necessarily help

when the new site is also overloaded, or when the shift oftra�c overloads it. Finally, we show evidence of collat-eral damage (§3.6) on services near the attacks. Theseresults and policies can be used by anycast operators toguide management of their infrastructure. Finally, thechallenges we show suggest potential future research inimproving routing adaptation under stress and provi-sioning anycast to tolerate attacks.

2. BACKGROUND AND DATASETSBefore studying anycast services under attack, we

first summarize how IP anycast works. We describethe events a↵ecting the Root DNS service on Nov. 30and Dec. 1, 2015, and the datasets we use to study theseevents.

2.1 Anycast Background and Terminol-ogy

We next briefly review how IP anycast and the RootDNS service works. The Root DNS service is imple-mented with several mechanisms operating at di↵erentlevels (Figure 1): a root.hints file to bootstrap, mul-tiple IP services, often anycast; BGP routing in eachanycast server; and often multiple servers at each site.

The Root DNS is implemented by 13 separate DNSservices (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. Theseare called the 13 DNS Root Letter Services (or just the“Root Letters” for short), since each is assigned a letterfrom A to M and identified as<letter>.root-servers.net.The letters are operated by 12 independent organiza-tions (Verisign operates both A and J), and each letterhas a di↵erent architecture, an intentional diversity de-signed to provide robustness. This diversity happensto provide a rich natural environment that allows us to

What was the impact at individual sites?

Page 26: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the Attack30

0 VP

s (o

ne p

er p

ixel

)

Nov. 30th

06:50 - 09:30 (UTC)Dec. 1st

06:50 - 09:30 (UTC)

~48 hours (one response per pixel)

Page 27: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the Attack

FRA

LHR

AMS

Blackout during attacks

Page 28: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the Attack

FRA

LHR

AMS

Site flipping

Page 29: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the AttackZoomed in: 40 VPs initially reaching LHR site

LHR

AMS

Nov. 30th

06:50 - 09:30 (UTC)

Page 30: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Impact of the Attack

section observation

§2.2 design choices under stress are withdraw or absorb;best depends on attackers vs. capacity per catchment

§3.1 event was at likely 35Gb/s (50Mq/s, an upper bound),resulting in 150Gb/s reply tra�c

§3.2 letters saw minimal to severe loss (1% to 95%)§3.3 loss was not uniform across each letter’s anycast sites;

overall loss does not predict user-observed loss at sites§3.4 some users “flip” to other sites;

others stick to sometimes overloaded sites§3.5 at some sites, some servers su↵ered disproportionately§3.6 some collateral damage occurred to co-located services

not directly under attack

Table 1: Key observations in this paper.

providing a service that adapts to DDoS attacks (suchas Akamai [28], Cloudflare, and others). Yet the specificimpact of DDoS on real infrastructure has not widelybeen reported, often because commercial infrastructureis proprietary.

The DNS is a common service, and the root serversare a fundamental, high-profile, and publicly visible ser-vice that have been subject to DoS attacks in the past.As a public service, they are monitored [45] and striveto self-report their performance. Perhaps unique amongmany large services, the Root DNS service is operatedby 12 di↵erent organizations, with di↵erent implemen-tations and infrastructure. Although the internals ofeach implementation are not public, some details (suchas the number of anycast sites) are.

To evaluate the e↵ects of DoS attacks on real-worldinfrastructure, we analyze two specific events: the RootDNS events of Nov. and Dec. 2015 (see §2.3 for dis-cussion and references). We investigate how the DDoSattack a↵ected reachability and performance of the any-cast deployments. This paper is the first to explorethe response of real infrastructure across several levels,from specific anycast services (§3.2), physical sites ofthose services (§3.3), and of individual servers (§3.5).An important consequence of high load on sites is rout-ing changes, as users“flip” from one site to another aftera site becomes overloaded (§3.4). Table 1 summarizesour key observations from these studies.

Although we consider only two specific events, we ex-plore their e↵ects on 13 di↵erent DNS deployments ofvarying size and capacity. From the considerable varia-tion in response across these deployments we identify aset of potential responses, first in theory (§2.2) and thenin practice (§3). Exploration of additional attacks, andof the interplay of IP anycast and site select at otherlayers (for example, in Bing [15]) is future work.

The main contribution of this paper is the first eval-

uation of several IP anycast services under stress with

public data. Anycast is in wide use and commercial op-erators have been subject to repeated attacks, some ofwhich have been reported [42, 43, 49, 58, 17, 50, 4],but the details of those attacks are often withheld as

(recursive resolverand its root.hints)

Root letters

(unique IPanycast addr.)

Sites

(unique locationand BGP route)

Servers

(internalload balancing)

user

a b c ... k l m

s1 ... s33

r1 ... rn

Figure 1: Root DNS structure, terminology, and mech-anisms in use at each level.

proprietary. We demonstrate that in large anycast in-stances, site failures can occur even if the service as awhole continues to operate. Anycast can both absorb

attack tra�c inside sites, and also withdraw routes toshift both good and bad tra�c to other sites. We ex-plore these policy choices in the context of a real-worldattack, and show that site flips do not necessarily help

when the new site is also overloaded, or when the shift oftra�c overloads it. Finally, we show evidence of collat-eral damage (§3.6) on services near the attacks. Theseresults and policies can be used by anycast operators toguide management of their infrastructure. Finally, thechallenges we show suggest potential future research inimproving routing adaptation under stress and provi-sioning anycast to tolerate attacks.

2. BACKGROUND AND DATASETSBefore studying anycast services under attack, we

first summarize how IP anycast works. We describethe events a↵ecting the Root DNS service on Nov. 30and Dec. 1, 2015, and the datasets we use to study theseevents.

2.1 Anycast Background and Terminol-ogy

We next briefly review how IP anycast and the RootDNS service works. The Root DNS service is imple-mented with several mechanisms operating at di↵erentlevels (Figure 1): a root.hints file to bootstrap, mul-tiple IP services, often anycast; BGP routing in eachanycast server; and often multiple servers at each site.

The Root DNS is implemented by 13 separate DNSservices (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. Theseare called the 13 DNS Root Letter Services (or just the“Root Letters” for short), since each is assigned a letterfrom A to M and identified as<letter>.root-servers.net.The letters are operated by 12 independent organiza-tions (Verisign operates both A and J), and each letterhas a di↵erent architecture, an intentional diversity de-signed to provide robustness. This diversity happensto provide a rich natural environment that allows us to

What was the impact at individual servers?

Page 31: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

What was the impact?

Impact at sites may depend... ... on load balancing ... on link resource ... on queuing

Individual server performance and reachability may not reflect site-wide situation.

The Impact of the Attack

0

100

200

300

400

500

600

700

800

nu

mb

er

of

VP

s

K-FRA-S1K-FRA-S2K-FRA-S3

K-F

RA

-S2

K-F

RA

-S3

0

50

100

150

200

250

300

350

0 5 10 15 20 25 30 35 40 45

hours after 2015-11-30t00:00 UTC

K-NRT-S1K-NRT-S2K-NRT-S3

Page 32: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Additional ImpactCollateral damage!

D-Root was not targeted... ... but felt the attack

Even SIDN (.nl) felt the attack: NO traffic in FRA and AMS

0

20

40

60

80

100

120

0 5 10 15 20 25 30 35 40 45

540

580

620

660

nu

mb

er

of

VP

s

hours after 2015-11-30t00:00 UTC

D-FRA

D-SYD

D-AKL

D-DUB

D-BUR

Page 33: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Collateral damage!

D-Root was not targeted... ... but felt the attack

Even SIDN (TLD) felt the attack: NO traffic in FRA and AMS

0 7 29 45

.nl i

nsta

nces

hours after 2015-11-30t00:00 UTC

NL-AMS

NL-FRA

The Additional Impact

0

20

40

60

80

100

120

0 5 10 15 20 25 30 35 40 45

540

580

620

660

nu

mb

er

of

VP

s

hours after 2015-11-30t00:00 UTC

D-FRA

D-SYD

D-AKL

D-DUB

D-BUR

Page 34: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

The Root DNS handled the situation quite well... ... at no time the service was completely unreachable

Resilience of the Root DNS is not an accident... ... consequence of fault tolerant design and good engineering!

True diversity is key to avoid collateral damage

The Lessons Learned

Page 35: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Learn from the Root DNS experiences

Have in mind the possible very large DDoS attacks when... ... designing distributed systems ... improving countermeasures and mitigation strategies

It does not matter if... ... someone was showing off ... someone was testing/scanning the infrastructure ... someone is learning how to take down the Internet

It was a big wake up call, this is critical infrastructure!

Things are escalating pretty fast and apparently we are not fully aware of what we are dealing with.

And, What Now?

Page 36: ddos root ripe73The Root DNS is implemented by 13 separate DNS services (Table 2), each running on a di↵erent IP ad-dress, but sharing a common master data source. These are called

Acknowledgements:

Arjen Zonneveld, Jelte Jansen, Duane Wessels, Ray Bellis, Romeo Zwart, Colin Petrie, Matt Weinberg and Piet Barber

SIDN Labs, NLnet Labs and SURFnet

Self-managing Anycast Networks for the DNS (SAND) project | http://www.sand-project.nl/ NWO DNS Anycast Security (DAS) project | http://www.das-project.nl/

[email protected] http://www.ricardoschmidt.com