Resolvers Revealed: Characterizing DNS Resolvers and their Clients

  • Authors:
  • Craig A. Shue;Andrew J. Kalafut

  • Affiliations:
  • Worcester Polytechnic Institute;Grand Valley State University

  • Venue:
  • ACM Transactions on Internet Technology (TOIT)
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Domain Name System (DNS) allows clients to use resolvers, sometimes called caches, to query a set of authoritative servers to translate host names into IP addresses. Prior work has proposed using the interaction between these DNS resolvers and the authoritative servers as an access control mechanism. However, while prior work has examined the DNS from many angles, the resolver component has received little scrutiny. Essential factors for using a resolver in an access control system, such as whether a resolver is part of an ISP’s infrastructure or running on an end-user’s system, have not been examined. In this study, we examine DNS resolver behavior and usage, from query patterns and reactions to nonstandard responses to passive association techniques to pair resolvers with their client hosts. In doing so, we discover evidence of security protocol support, misconfigured resolvers, techniques to fingerprint resolvers, and features for detecting automated clients. These measurements can influence the implementation and design of these resolvers and DNS-based access control systems.