0

You didn't notice.
You never do.

To open this page, your computer asked a question and a global system answered in under 30 milliseconds.

$
Friday · October 21, 2016 · 07:10 UTC

Half the internet
went dark.

Dyn DNS Status
All systems operational
Twitter
Reddit
Pinterest
Netflix
Spotify
SoundCloud
Amazon
PayPal
Shopify
GitHub
Heroku
Slack
CNN
NYT
WSJ
HBO
Airbnb
Etsy

The servers were fine.

The websites were fine.

But nobody could find them.

Attack vector

Normal DNS traffic ~50 Gbps
Mirai attack traffic 1.2 Tbps
24x normal volume

100,000 hijacked devices. Baby monitors. Security cameras.
The Mirai botnet.

The thing they attacked is called

DNS

Everything you do online starts with it.


Humans speak names.
Machines speak numbers.

DNS is the translator between the two. Every connection starts with a question and an answer.

DNS Resolver
1/5
Query
google.com
Answer

378.5 million domain names exist. Without DNS, you'd memorize addresses like this.

2607:f8b0:4004:0800:0000:0000:0000:200e

That's Google.

One query.
Six hops. 30 milliseconds.

Follow a single DNS lookup across the internet — faster than you can blink.

dnslab.dev resolution
0ms
1
2
3
4
5
6
Step 1 of 6

Your Browser

Cache miss
"Where is dnslab.dev?"
0ms
Step 2 of 6

OS Resolver

127.0.0.53 · Stub resolver
"Not here. Forwarding."
+0.5ms
Step 3 of 6

Recursive Resolver

1.1.1.1 · Cloudflare
"Let me find out for you."
+2.5ms
Step 4 of 6

Root Server

192.5.5.241 · F-Root · ISC · San Jose
"Try the .cool TLD servers."
+5ms
Step 5 of 6

.cool TLD

ns1.nic.cool · Anycast
"Ask ns1.dnslab.dev."
+7ms
Step 6 of 6

Authoritative NS

ns1.dnslab.dev
"76.223.54.62"
+15ms
30ms

Faster than a blink. Faster than your reflexes.

That was one query. This page triggered 47 more.

Most queries never
make it that far.

5.8 billion queries per second enter the system. Almost none of them reach the bottom.

DNS queries
5.8 billion/sec
0% 100%
Layer 1 of 4

Browser Cache

80%

resolved here

Already resolved in the last few minutes. Never leaves your machine.

Layer 2 of 4

OS Cache

60%

resolved here

Your operating system remembers too. Shared across every app.

Layer 3 of 4

Resolver Cache

85%

resolved here

Your ISP or Cloudflare already asked this question for someone else.

Layer 4 of 4

Root Servers

0.026%

of all queries reach here

13 names. 1,959 instances worldwide. They handle what nothing else can.

Root servers handle 130 billion queries per day.

That's just 0.026% of the total.

Caching is what makes DNS possible.

II
How big is this?
0

DNS queries. Every single day.

500 trillion. More than Google searches per year.

5.8 billion every second.

In the time it took to read this, ~23 billion more.


The entire internet depends
on 13 names.

RootOperatorSites
AVerisign59
BUSC-ISI6
CCogent13
DU. of Maryland231
ENASA328
FISC354
GDISA6
HUS Army12
INetnod89
JVerisign150
KRIPE NCC149
LICANN143
MWIDE Project28
13 names, 0 machines. The limit exists because all root addresses must fit in a single 512-byte UDP packet  — a constraint from 1983.

By the numbers.

~500T/day
Global DNS queries
10.36ms
Cloudflare avg response
Fastest public resolver
1.14ms
Frankfurt resolution
Faster than a nerve impulse
378.5M
Registered domains
159.4M
.com domains
42% of all
1,593
TLDs in root zone
$70M
AI.com sale price
Most expensive domain ever sold
6
Domains in 1985
The entire .com namespace
75.3%
Renewal rate
1 in 4 domains dies each year

DNS query volume, 2015–2025


Before DNS, the entire internet
fit in one file.

HOSTS.TXT
# HOSTS.TXT — maintained by SRI-NIC
# Last updated: Thursday, November 3, 1983
HOST : 10.0.0.73  : SRI-NIC   : DEC-2060   : TOPS20
HOST : 10.1.0.13  : UCLA-CCN  : IBM-360/91 : OS/MVT
HOST : 10.0.0.51  : MIT-AI    : PDP-10     : ITS
HOST : 10.3.0.52  : STANFORD  : PDP-11/40  : MOS
HOST : 10.1.0.5   : BBN-TENEX : PDP-10     : TENEX

Elizabeth "Jake" Feinler ran the Network Information Center at Stanford from 1972. If you wanted to add a computer to the internet, you called her office — during business hours, Pacific time. Her team maintained this file. They invented .com, .edu, .gov, .org, .net.

By the early 1980s, with hundreds of hosts, the model was breaking.


1983. Paul Mockapetris was asked to evaluate proposals to fix the problem. He invented something new instead.

RFC 882 and RFC 883 defined the Domain Name System — a distributed, hierarchical database with no single point of failure. It has barely changed since. The scale has increased by a factor of millions.

40 years of the
invisible system.

1969

First ARPANET message

'lo' — crashed after two characters. They were typing 'login'.

It starts here.

1972

Feinler takes over the NIC

Her office at Stanford becomes the internet's directory.

One woman, one file, the whole internet.

1983

RFC 882/883 published

Mockapetris invents DNS. Distributed, hierarchical, no single point of failure.

The elegant solution.

1985

symbolics.com

First .com domain. March 15. Six total that year.

6 domains. 6.

1987

apple.com

February 19. The big names arrive.

1993

$100 per domain

Registration opens commercially. The gold rush begins.

1998

ICANN founded

DNS governance formalized. Jon Postel dies 16 days later.

'The God of the Internet'

2008

The Kaminsky bug

Every DNS server on Earth vulnerable. Largest coordinated vendor patch in history.

2009

Google launches 8.8.8.8

Free public resolver. Memorizable address. Changes who controls DNS resolution.

2010

DNSSEC at the root

July 15. Cryptographic signatures added to the root zone.

2016

Dyn attack

Mirai botnet. 1.2 Tbps. Half the internet goes dark.

DNS's worst day.

2018

1.1.1.1 launches

Cloudflare's privacy-focused resolver. April 1 — not a joke.

2019

The DoH wars

Mozilla enables DNS-over-HTTPS by default. ISPs and governments push back.

Who controls resolution?

2021

Dan Kaminsky dies at 42

The researcher who saved the internet.

2024

KeyTrap vulnerability

CVE-2023-50387. A single DNS packet can stall resolvers for 16 hours.

DNSSEC's own attack surface.

2025

Now

378.5M domains. 500T queries/day. 1,959 root instances. Still invisible.


The names behind
the names.

Elizabeth Feinler

Ran the internet's directory from Stanford. Created .com, .edu, .gov, .org. Internet Hall of Fame, 2012.

Paul Mockapetris

Designed DNS in 1983. It's still running. ACM Software System Award, 2020.

Jon Postel

RFC Editor for 30 years. 'Be conservative in what you send, be liberal in what you accept.'

Dan Kaminsky

Found a bug in every DNS server on Earth. Coordinated the largest simultaneous vendor patch in history.

Paul Vixie

Maintained BIND — the DNS software behind most of the internet — since 1988. Operates F-Root.

Daniel J. Bernstein

Created djbdns as a secure alternative to BIND. Won a First Amendment case establishing code as protected speech.

III
Can we trust this?

The padlock lies.

You see the padlock. You feel safe. But before that encrypted connection was established, your browser sent a DNS query  — in plain text — asking "What is the IP of mybank.com?"

Anyone on the network path could see it. Anyone could answer with a fake address. Your ISP, your Wi-Fi operator, transit providers, the resolver itself.

HTTPS encrypts the connection. DNS — the step before it — was built in 1983 without any protection at all.


DNS security is
decades behind.

96%
HTTPS (top 1,000 sites)
35%
DNSSEC validation (global)
14%
DNS encryption (DoH/DoT)
4%
DNSSEC signing (.com)

Google, Facebook, Amazon — none sign their primary domains with DNSSEC.

Key incidents

2008
Kaminsky bug— Every DNS server on Earth vulnerable
2018
MyEtherWallet— BGP/DNS hijack — $150K Ethereum stolen
2017–19
Sea Turtle— State-sponsored DNS hijacking, 13 countries
2020
SolarWinds— DNS as covert command-and-control

DNS is finally getting
the encryption it was
born without.

YearProtocolTransportProtection
1983DNSPort 53None
2016DNS-over-TLSPort 853Encrypted
2018DNS-over-HTTPSPort 443Encrypted + hidden
2022DNS-over-QUICPort 853Faster + encrypted
2022Oblivious DoHProxiedResolver-blind

While you were reading this, DNS answered

~0

queries.

It will answer billions more before you go to sleep tonight. And you'll never notice.

That's the point.

"It's not DNS. There's no way it's DNS. It was DNS."