[dns-operations] Strange 0.0.0.0.p.t.t.h.ip6.arpa. queries
Ask Bjørn Hansen
ask at develooper.com
Tue Oct 9 07:39:42 UTC 2007
[ I tried posting this on nanog a few days ago, but it didn't go
through. It was suggested that this might be the best place to ask
anyway and since trying to post to nanog I figured it out, sorta ].
Hi everyone,
I run the pool.ntp.org system. Many recent Linux (and others)
distributions default to using {0,1,2,3}.pool.ntp.org for NTP
services. The pool system monitors about 1400 ntp servers that
have volunteered to be part of the pool. The DNS requests resolves
to a random-ish selection of currently active and well-functioning
NTP servers. Viola - massively scaled NTP service.
Recently I changed the nameserver software for pool.ntp.org to give
better answers to the queries and in the process I occasionally
looked in the logs (woah - never look in your nameserver logs; what
an amazing amount of bogus queries - I can't imagine how painful it
must be to see the root-server traffic).
In particular we are getting a few hundred thousand PTR queries for
"0.0.0.0.p.t.t.h.ip6.arpa." every hour to the pool.ntp.org servers
({a,b,c,d,e}.ntpns.org).
After a bit of time staring at the log from my nameserver and tcpdump
output I realized it is people trying to resolve "http://north-
america.pool.ntp.org." (possibly with a broken request packet, I
didn't look that closely). Somehow Net::DNS::Nameserver translates
that to a PTR request.
In any case it's a bad request -- we don't have a "http://north-
america" host. I'm not sure what the best to do with it would be
though. I could make my nameserver give them back a working IP
address - since that'd be cached better it'd also lower the number of
these queries to my nameserver. But I'd rather not encourage the
misconfigured clients.
I could try to track down if someone made software with this
particular misconfiguration; but with millions of users that's hard.
Any suggestions? That's the operationally reasonable thing to do?
2007-10-05 22:31:43.792296500 193.162.153.170 |
0.0.0.0.p.t.t.h.ip6.arpa. | PTR IN
2007-10-05 22:31:43.795737500 193.162.153.162 |
0.0.0.0.p.t.t.h.ip6.arpa. | PTR IN
2007-10-05 22:31:43.907498500 62.254.206.205 |
0.0.0.0.p.t.t.h.ip6.arpa. | PTR IN
2007-10-05 22:31:45.141533500 68.87.85.100 |
0.0.0.0.p.t.t.h.ip6.arpa. | PTR IN
2007-10-05 22:31:45.434304500 68.87.73.243 |
0.0.0.0.p.t.t.h.ip6.arpa. | PTR IN
2007-10-05 22:31:45.769949500 200.47.10.93 |
0.0.0.0.p.t.t.h.ip6.arpa. | PTR IN
- ask
[1] http://geo.bitnames.com
--
http://develooper.com/ - http://askask.com/
More information about the dns-operations
mailing list