Public Stories, etc
DNSdump is a Perl script which capture and displays DNS mesages, much like tcpdump would, but purpose built. However, dnsdump does not currently support DNS over TCP.
DNSdump can be obtained from the Measurement Factory:
Submitted by admin on Fri, 2015-02-06 13:28 categories [ ]
One of OARC's functions is to collect and archive DNS-related data from its members. This data is available to members for research and operational use. Some of OARC's data is available through the secure member's portal. Other data is available via shell access from a read-only file server.
Members that require access to data must adhere to the guidelines outlined in the OARC Membership and Data Access Agreement.
Real-Time DSC Data
Submitted by admin on Thu, 2014-12-11 20:05 categories [ ]
The following candidates were re/elected to the OARC Board for 2-year terms:
OARC welcomes and congratulates the new Board members on their successful election.
We thank the unsuccessful and withdrawn candidates:
for their willingness to consider serving on OARC's Board.
We also want to express a special thanks to our outgoing Board members Antoin Verschuren and Matt Pounsett for their years of service and energetic contribution to OARC.
Submitted by keith@ on Mon, 2014-10-13 18:50 categories [ ]
This will be held in co-operation with the ccNSO Tech Day of the subsequent ICANN51 meeting. The OARC AGM and member-only session will be held on Saturday 11th October, the main workshop on Sunday 12th, and a joint session with ICANN's Tech Day on Monday 13th.
Submitted by keith@ on Wed, 2014-09-24 14:13 categories [ ]
During the 2014 OARC Annual General Meeting we will be electing three seats on the OARC Board of Directors. The seats becoming available are doing so on the following basis:
Submitted by keith on Thu, 2014-09-18 19:59 categories [ ]
In addition to regular AGM business, the OARC Board will be proposing a revised version of the OARC Participation Agreement for member review and approval. Regular rotation of OARC Directors means we also have 3 Board seats to fill by election at this AGM.
Submitted by keith on Tue, 2014-08-26 14:00 categories [ ]
With the assistance of its members and friends (especially AFNIC, RIPE, former OARC Secretariat Paul Vixie, and Paul Hoffman) DNS-OARC has assembled a historical archive of the DNS root zone dating back to July 1999. This Root Zone Archive is a part of our larger project, the Zone File Repository.
Root Zone Trends
The following graph shows trends in the contents of the root zone:
Submitted by admin on Wed, 2014-08-20 12:39 categories [ ]
7 June 2011 UPDATE: The .de zone is now fully signed and the corresponding DS Resource Record has been added to the root zone, so the testbed redirection has been removed from both resolvers.
4 October 2010 UPDATE: We have now added the .de DNSSEC Testbed to both resolvers.
How To Use ODVR
OARC is pleased to offer dual-stack (as in IPv4 and IPv6), open DNSSEC-validating resolvers ("ODVR") that anyone can use to experiment with DNSSEC. The IP addresses for ODVR nameservers are:
You might like to manually query the ODVR nameservers with a tool such as dig. Be sure to add the +dnssec option:
$ dig +dnssec @18.104.22.168 iis.se | less
The AD bit in the response flags tells you that the reply data has been validated:
;; flags: qr rd ra ad; ...
Another way to use ODVR is to place the following lines in your Unix /etc/resolv.conf file:
nameserver 22.214.171.124 nameserver 126.96.36.199
Windows users can manually set DNS servers in the Internet Protocol Properties dialog of a network connection.
Finally, the client (such as dig) that you use to test against ODVR should allow you to use this tool by specifying IPv4 or IPv6 options.
ODVR has been configured with the following list of trust anchors:
ODVR also validates against ISC's DLV registry.
OARC collects data from the ODVR nameservers and makes this data available to our members for research purposes.
These graphs, updated nightly, show the number of queries received with and without the "DO" bit set, and the number of responses sent with and without the "AD" bit set.
Frequently Anticipated Questions
Q: Does it mean all my DNS lookups are secure if I use OARC's validating resolvers?
A: No, probably not, for the following reasons:
Q: Then why are you doing this?
A: A few reasons:
Q: Can I use ODVR nameservers provide protection from Kaminsky-style spoofing attacks?
A: The answer is complicated and depends on a number of other factors. Generally, this should not be your motivation for using ODVR. If you are stuck using a DNS resolver with poor source port randomization then ODVR may make you more secure. However, a determined attacker could probably spoof answers that appear to come from the ODVR nameservers and give you bad answers.
Q: I thought open resolvers were a bad thing?
A: It's true that open resolvers are usually considered to be a problem and have been used — in combination with source address spoofing — to conduct large-scale DDoS attacks. Such attacks are made possible because (1) there are hundreds of thousands, if not millions, of open resolvers, and (2) their owners/operators are unaware of the openness. The ODVR nameservers are rate-limited and closely monitored. If we have reason to suspect abuse of the ODVR nameservers, we will act quickly to stop it. Please contact the OARC Admin if you have abuse concerns.
Q: Can DNS-OARC members have non-rate-limited access?
A: Absolutely. Write to the OARC Admin to find out how.
Submitted by admin on Sat, 2014-08-09 15:50 categories [ ]
DNS-related tools/applications, which are linked to the author's site, or which may be downloaded directly from this site.
Submitted by Anonymous on Wed, 2014-07-30 18:08 categories [ ]
US-CERT's Vulnerability Note VU#800113 describes deficiencies in the DNS protocol and implementations that can facilitate cache poisoning attacks. The answers from a poisoned nameserver cannot be trusted. You may be redirected to malicious web sites that will try to steal your identity or infect your computers with malware. Working exploits for this issue are already widely circulated! Upgrade your nameservers ASAP if you haven't done so already! Additional details about these poisoning attacks are available in Dan Kaminsky's post of August 7, 2008.
Submitted by admin on Tue, 2014-07-29 21:15 categories [ ]
ARI Registry Services
Public Interest Registry
University of Maryland