On 8/14/2022 8:28 PM, Tim Wicinski wrote:
On Sun, Aug 14, 2022 at 11:16 PM John Levine<jo...@taugh.com>  wrote:

It appears that Tim Wicinski<tjw.i...@gmail.com>  said:
-=-=-=-=-=-

as someone who looks at lots of caching resolver logs, you could add
.local
to this.
But even those query loads are not what I consider a problem .
It's not the query loads, it's the data leakage.  I gather that the stuff
that leaks out to public DNS .CORP queries is quite amazing.

R's,
John


Yes, I agree, and the .local data leakage has become enough
of an issue that it is being addressed.

According to the stats published here (https://ithi.research.icann.org/graph-m3.html), the following names are among the most frequently seen at the ICANN Managed Root Servers:

    .local: 7.3%
    .internal: 4.1%
    .home: 1.7%
    .dhcp: 1.5%
    .bbrouter: 1.4%
    .ctc: 1.1%

The numbers here are % of traffic seen at the root, as in, "out of 100 queries to the root, on average 7.3 will be for <something>.local".

.corp is also visible, but with 0.3% of root traffic it ranks 13th among the top leaked domains. .onion is barely visible, with 0.01% of root traffic.

-- Christian Huitema

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to