Measuring TTL Violation of DNS Resolvers at scale

Protick Bhowmick, Md. Ishtiaq Ashiq, Casey Deccio*, Taejoong Chung

Virginia Tech, *Brigham Young University

About This Study

The Domain Name System (DNS) provides a scalable name resolution service. It uses extensive caching to improve its resiliency and performance; every DNS record contains a time-to-live (TTL) value, which specifies how long a DNS record can be cached before being discarded. Since the TTL can play an important role in both DNS security (e.g., determining a DNSSEC-signed response’s caching period) and performance (e.g., responsiveness of CDN-controlled domains), it is crucial to measure and understand how resolvers violate TTL. Unfortunately, measuring how DNS resolvers manage TTL around the world remains difficult since it usually requires having the cooperation of many nodes spread across the globe. In this paper, we present a methodology that measures TTL-violating resolvers using an HTTP/S proxy service called BrightData, which allows us to cover more than 27 K resolvers in 9.5 K ASes. Out of the 8,524 resolvers that we could mea- sure through at least five different vantage points, we find that 8.74% of them extend the TTL arbitrarily, which potentially can degrade the performance of at least 38% of the popular websites that use CDNs. We also report that 44.1% of DNSSEC-validating resolvers incorrectly serve DNSSEC-signed responses from the cache even after their RRSIGs are expired.

This paper will be published at PAM’2023 (Passive and Active Measurement Conference)

Datasets and source codes

To foster reproducibility and stimulate further research, we publicly release the followings: (Please cite this study when using the datasets.)

1. Datasets

For these two datasets, Archive describes the datasets

3. Analysis codes

For reproducibility of our paper, we share the analysis codes here.