Google DNS servers suffer brief traffic hijack

 

Are security measures enabled?

Traffic to Google's commonly used public DNS service was rerouted over the weekend, meaning traffic with Domain Name System resolution queries destined for Google's servers ended up at a Venezuelan network instead.

UK telco BT's Latin America division in Venezuela became the destination for the IP address range used by Google, in a phenomenon known as BGP (border gateway protocol) hijacking, according to monitoring firm BGPmon.

The rerouting affected networks in that country and Brazil for 22 minutes, BGPMon said.

Why BT Latin America was able to announce the incorrect traffic routing despite Google's security measures to protect against hijacking isn't known. iTnews has put in queries with both BGPMon and BT LATAM.

BGP traffic hijacking is on the rise, according to internet performance metrics analyst firm Renesys, which last year noted that over a period of two months, around 1500 IP address blocks were rerouted. Several were in Australia.

Google's 8.8.8.8 and 8.8.4.4 (IPv6: 2001:4860:4860::8888 and 2001:4860:4860::8844) free public DNS resolvers were set up in 2009 with the aim to provide better performance for queries, as well as improved security.

They are said to fully support DNSsec security policies and validation, but it is not clear whether the routers for the servers' network support resource public key infrastructure (RPKI) for BGP.

These security measures provide route origination authorisation objects (ROAs) that specify which autonomous systems can announce routes for certain IP address prefixes

A query by iTnews at whois.bgpmon.net for the ROA for the 8.8.8.0/24 network range did not produce any result, suggesting there is no policy in place to prevent BGP hijacking through wrong unauthorised announcements.

Google's free and open DNS infrastructure is very popular with users around the world. Last year, Google said its public DNS servers answer 130 to 150 billion queries a day from 70 million unique IP addresses.

Similar large numbers were seen in a test by Geoff Huston at the Asia-Pacific Network Information Centre (APNIC) using just under 2.5 million clients. That test showed 7.2 percent had queries passed on to authoritative nameservers from Google's DNS service.

Google Australia was asked for comment on the rerouting of its DNS service, but has yet to respond to iTnews.

Copyright © iTnews.com.au . All rights reserved.


Google DNS servers suffer brief traffic hijack
 
 
 
Top Stories
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
Telstra hands over copper, HFC in new $11bn NBN deal
Value of 2011 deal remains intact.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1798

Vote
Do you support the abolition of the Office of the Information Commissioner?