Root Nameserver Year 2000 Status

Date: 
15 July, 1999

Root Nameserver Year 2000 Status


David Conrad, Internet Software Consortium
Akira Kato, WIDE Project, University of Tokyo
Bill Manning, Information Sciences Institute, USC

 


Introduction


Due to its fundamental design assumption of a singly rooted hierarchical
namespace, the domain name system (DNS) comprises one of the few
(logical) single points of failure within the Internet. More specifically, the
root of the Internet namespace is held in 13 geographically distributed root
name servers
operated by nine independent organizations. In a worst case
scenario, loss of all 13 of the root name servers would result in significant
disruption to Internet operation as name to address translation (and vice versa)
would no longer function.


In preparation for the year 2000 (Y2K), this document describes the research
done and steps taken to insure that the operation of the 13 root name servers is
not disrupted. The first section of this document describes the root nameserver
system, detailing the two major components of that system, the root zone file
and the servers which make that file available via the DNS protocol. Next, the
administrative services which insure that the root name servers operate
correctly will be discussed, followed by a section describing the Y2K testing
performed by the root name server operators to date. Finally, open issues (as of
the July, 1999) will be presented along with a brief summary.


The data presented in this document was collected in Y2K seminars and the
ICANN Root Server System Advisory Committee (RSSAC) meetings in Singapore
(during APRICOT '99), INET '99, and several IETF meetings and was discussed and
reviewed in online discussion from July 1998 - June 1999.


While not a guarantee of Y2K compliance, this document hopes to demonstrate
that the root name server system does not exhibit significant potential for
disruption of the Internet at or around the year 2000.

face=Arial>

The Root Nameserver System


The Root Nameserver System is comprised of three major components, the DNS
protocol itself, the root zone file and the root name servers.
This section describes these components in some detail.


The DNS protocol only uses relative time, that is, periods of time relative
to an arbitrary starting point, for the purposes of timers to insure proper
timeout and retry periods. As such, there is no dependence on absolute time,
e.g., calendar dates, and the DNS protocol itself has no Y2K issues.


The root of the Internet namespace consists of a single file, the root zone
file, which describes the delegations of the top level domains and the
associated records necessitated by the DNS protocol to implement those
delegations. Currently, this file is maintained by Network Solutions
Incorporated of Herndon, Virginia, USA and is made available to the 12 secondary
servers from the primary
size=2>a.root-server.net. Change control of this file is
held by the IANA with changes, typically modifications of the name servers for
top level domains, being made approximately once or twice a week.


The root zone file is made available to the root name servers either in-band
via the DNS protocol itself (through zone transfers as described in RFC 1034) or
out-of-band via the FTP protocol (as described in RFC 952). Given the relatively
small size of the root zone, most updates of the root zone file are propagated
via zone transfers.

The root zone file itself is composed of 7-bit ASCII characters and contains
an SOA record, NS records for each of the top level domain zone delegations, and
associated glue records. As a (human) administrative convenience, the SOA serial
number is often represented as a date indicating the last modification to the
zone file, typically of the form YYYYMMDDXX where YYYY is the year, MM is the
month (1-12), DD is the day (1-31), and XX is a sequence number indicating the
number of updates within a day. The DNS protocol, however, treats the serial
number as an unsigned 32 bit value that is compared using "sequence number
arithmetic" (see RFC 1982) such that 0 is larger than 4,294,967,296 thereby
allowing serial number wrap-around. As such, the serial number represented as a
date as described does not pose a Y2K issue. However, it should be noted that
some vendors have shipped versions of the name server with sample configuration
files that used YYMMDDXX format for the serial number. Sites that followed that
example and naively update their serial numbers in the year 2000 may experience
Y2K issues and should consult RFC 1982. As the root zone serial number is
consistent with RFC 1982 conventions, this will not affect root name server
operations.


The root name servers are the machines that provide access to the root zone
file for proper DNS protocol operation. Due to protocol limitations, the number
of these machines is currently limited to 13, although efforts are underway to
remove this limitation. A conscious effort has been made to diversify the
administration of these 13 machines in several areas. As of this writing, the
root name servers are operated by the US military, commercial organizations,
non-profit organization, Internet service providers, universities, and research
institutes with 3 of the 13 servers being operated outside the US, one in London
(administered from the Netherlands), one in Japan, and one in Sweden. The
complete list of root name servers and their operators can be found in appendix
A.


All of the 13 servers have some "hardening" with respect to environmental
contingencies. This hardening includes the use of controlled physical access,
protection against power grid and cooling failures with UPS protected power with
local generator capacity for extended outages, and diverse Internet connectivity
in layers 1 through 3. The root servers themselves all use some variant of the
Unix operating system, however both the hardware base and the vendors' Unix
variants are relatively diverse: of the 13 root servers, there are 7 different
hardware platforms running 8 different operating system versions from 5
different vendors.


Given the name servers are geographically distributed and some of the name
servers operate on local time (as opposed to GMT), all the root name servers
will not encounter significant Y2K events at the same time. It has been
estimated, given the amount of traffic each individual root name server
receives, that root name service can function given current loads with little to
no disruption when 40% of the name servers are offline, thus should a
significant Y2K issue be found, the diversity of time zones will permit the root
name server system to continue operation while the issue is
resolved.


Administrative Services


Administratively, the root name server operators have all taken steps to
minimize susceptibility to Y2K disruptions. Each root name server site keeps
backup copies of zone files, thus should a disruption occur in the generation or
transmission of the root zone file, the root servers can make use of backup
copies until the situation is resolved. In addition, each root name server
operator has contact information (in hard copy) for all other operators, thus
should an issue be detected, the root name server operators can get in contact
with each other (assuming the telephone system is operational). As all root name
servers run recent versions of BIND, expertise in troubleshooting and resolving
name server issues can be shared.


With respect to the administration of the root name server hardware itself,
each root name server has redundant hardware available to it. In some cases, the
hardware is in the form of a hot spare, able to be made operational with human
intervention. In other cases, the hardware is operated as a live spare able to
take on the full load of serving the root zone without human intervention should
their be a hardware failure. However, should disruption occur, each root name
server operator has multi-level system administration personnel and support with
internally defined escalation procedures.


Testing


In order to increase confidence levels that Y2K issues will not negatively
impact the operation of the root name serves, the root name server operators
have undertaken testing of various aspects of the root name server system. As
previously mentioned, each root name server run on some variant of Unix and the
root name servers have been in contact with the vendors/authors of those Unix
variants to ascertain the level of Y2K testing performed for the operating
system as a whole.

In addition, core application software running on all of the root name
servers has been reviewed for Y2K compliance. These applications are BIND, NTP,
Syslog, and SSH and all known Y2K issues with these applications have been
addressed. Perhaps the most critical of these applications in the context of
root name service, BIND, has been subject to extensive Y2K review by many third
parties including the US Military and has not been found to have any Y2K issues.
NTP provides clock synchronization, insuring machine clocks are quite closely
aligned with standard time sources. While no Y2K issues have been detected
within NTP, should there exist any, the operation of the name server would not
be affected as BIND makes no use of the system clock itself. With respect to
syslog, some Y2K issues are known to exist, particularly in older versions of
this application. However, Syslog is only used to log system messages, thus no
direct impact would be made on name server operation albeit the log files for a
machine with a non-Y2K compliant Syslog may be confusing to read (e.g., the year
2000 may be represented as 19100 as 99 is incremented by 1). SSH provides remote
access to the root name server. While no Y2K non-compliance issues are known
with SSH, failure of this application simply means remote access to the root
name server is impacted, there would be no impact on the operation of the name
server software itself.


With respect to the Y2K event itself, testing for Y2K clock rollover, leap
year, and GPS failure have been done on isolated root name server systems with
no operational impact noted. In addition, several of the root name server
operators have their own, enterprise-wide Y2K compliance programs and are
insuring all systems within their enterprise will not be affected by Y2K related
events.


Finally, contact information, including telephone (landline and mobile where
available), fax, and email for the root name servers is periodically verified to
insure that the information is correct and up to date.

face=Arial>

Open Issues


This section discusses some open issues made apparent in the review of Y2K
related considerations by the root name server operators. While not indicative
of specific problems, they do indicate areas that may warrant future study.


As is well known, the most significant open issue is the use of 32 bit
counters for time on Unix operating systems. As the Unix epoch begins Jan 1,
1970, there will exist an issue in the year 2038. Discussion of the Y2.038K
issue is beyond the scope of this document. Also related to the use of Unix,
some system or library calls are known to have Y2K issues, in particular dates
written in syslog records. While these system or library calls may make reading
logs a bit complicated, they should not have any direct impact on the operation
of critical software.


Finally, the root name servers exist in an environment that may be subject to
Y2K difficulties. In particular, power grid failures, telecom infrastructure
failure, cooling system failures, security system failures, etc. are all areas
in which Y2K concerns have been raised. The root name server operators have
taken what steps they can to minimize the impact of such failures, however most
of these systems are beyond the control or influence of the root name server
operators, thus problems may yet exist.


Summary


The root name server system, comprised of the DNS protocol itself, the root
zone file, and the root name servers, has been reviewed for Y2K related issues
and testing for various Y2K related events, including Y2K clock rollover, leap
year, and GPS failure, has been done with no operational impact noted.

Operation of the root name server system is highly diversified and where
common elements exist, significant testing has been done to ferret out any Y2K
related issues and to resolve them.


Acknowledgements


This document was derived from a presentation prepared by Bill Manning of
USC-ISI for the ICANN RSSAC and includes data collected by Akira Kato of Tokyo
University. Evi Nemeth provided helpful comments and
wordsmithing.


Appendix A -- Root Name Server Operators and Locations












































































Name


Organization


City, State/Province


Country

URL


A


Network Solutions, Inc

Herndon, VA


USA


http://www.netsol.com

B


Information Sciences Institute, University of Southern
California


Marina Del Rey, CA


USA


http://www.isi.edu


C


PSINet


Herndon, VA


USA


http://www.psi.net


D


University of Maryland


College Park, MD

USA


http://www.umd.edu


E

National Aeronautics and Space Administration


Mountain View, CA


USA


http://www.nasa.gov


F


Internet Software Consortium


Palo Alto, CA


USA


http://www.isc.org


G


Defense Information Systems Agency


Vienna, VA


USA

http://nic.mil


H


Army Research Laboratory

Aberdeen, MD


USA


http://www.arl.mil

I


NORDUNet


Stockholm


Sweden


http://www.nordu.net


J


(TBD)


Herndon, VA


USA


N/A


K


RIPE-NCC


London

UK


http://www.ripe.net


L

(TBD)


Marina Del Rey, CA


USA


N/A


M


WIDE


Tokyo


Japan


href="http://www.wide.ad.jp/">http://www.wide.ad.jp