
Farsight Security operates a Passive DNS database called theDNSDB ™.It contains DNS data contributed by numerous volunteer Passive DNS sensor nodeoperators located all over the world.
While we greatly appreciate the data we receive from each and every one of ourcontributors, we’re always interested in adding more.
Operating a Passive DNS sensor and contributing data is technicallystraightforward. Since the data contributions focus solely on upstream cachemiss traffic, there is no privacy impact for local users.
Each Passive DNS data contributor helps the community to better understandwhat’s happening on the Internet — including providing data that will help thecommunity win the fight against cybercrime, botnets, malware, and other sortsof online abuse. Although Farsight Security is a for-profit company and wefinance our operations through subscription fees, we are committed tosupporting law enforcement agents, academic researchers, and non-profitorganizations with full or partial grants of our services. To learn more aboutordering our services, please visit ourOrder page.
In an increasingly-opaque network world, Passive DNS data remains uniquelyaccessible as a “proxy measure” for virtually everything that’s happening onthe Internet. That is, whenever you visit a web page, send an email message,or do pretty much anything else online, you rely on DNS. If that DNS activityis able to be sampled, you’ve got a terrific indirect measure for thesubstantive underlying behaviors that we may NOT be able to be directlymeasure.
Thus, Passive DNS data, broadly collected and properly analyzed, canobjectively inform researchers about what’s new, what’s suddenly popular, andwhat may be going badly awry on the Internet — all more or less in real time.Passive DNS data can also be used historically to provide insights on pastInternet activity.
Farsight Security has no interest in personally identifiable information (PII).We intentionally only collect DNS data upstream from caching recursive resolvers. That means we only see “cache miss” traffic, e.g., requests fordomain names that aren’t already in the local recursive resolver’s cache, andthe apparent source of those queries will always be your caching recursiveresolver, not your end user. Farsight Security can also arrange to completelysuppress collection of data from your sensor for any queries pertaining to yourown domains’ names, if that provides additional reassurance that the privacy oflocal users will be totally respected.
When it comes to DNS, Farsight Security knows that there can be substantialvariation in traffic patterns from region to region. If we were tohypothetically only get Passive DNS data from American service providers, we’doften end up missing Asian-, European- or southern hemisphere-only DNSphenomena. For example, while .com domains are very popular worldwide, inGermany, .de domains are prevalent. If we didn’t have Passive DNS sensorsproviding DNS data from Germany (and other Germanic countries), we might miss(or at least substantially underestimate) the prevalence and importance of .detraffic.
This is no different than collecting climate data. If you only observe weatherphenomena in warm locales (such as San Diego, Miami, or Honolulu), you’re goingto be poorly positioned to understand what people in cold locales (such asBuffalo, Fargo, or Fairbanks), are experiencing, particularly during thewinter! You need a wide range of measurement points in order to have a broadsense of what’s happening across the country (or around the world).
Redundant Passive DNS sensor node coverage also ensures that the FarsightSecurity data will remain robust if we lose an individual node or datacontributor. Redundancy provides excellent insurance against unexpected andotherwise unavoidable interruptions.
Farsight Security does not publish this information. We protect the identitiesof those who share data with us because we don’t want to accidentally perturbthe data that is contributed. That is, if the bad guys were to hypotheticallylearn that a particular service provider is working with us, they might striveto avoid that site so as not to be noticed, just as many bad guys work hard toavoid spam traps, honey pot networks, dark space telescopes, and otherInternet data collection infrastructure.
In thinking about whether or not your company or organization should join oursensor collective, you may wonder, “Do we really have DNS data that would beuseful to contribute?” In many cases, yes, you really do. The sort of partnersthat we believe would likely be particularly interesting to add are listedbelow.
In other words, “Why should I bother sharing my DNS data with you guys?” Thisis a terrific question, and one where motivations may vary widely fromparticipant to participant:
As discussed in the official documentation, the Farsight Passive DNS sensor works by capturing rawpackets from a network interface and reconstructing the DNS transactions thatoccurred between recursive and authoritative nameservers. It can be deployedeither directly on the recursive DNS server or on a monitoring server withaccess to a network tap or port mirror. In the latter case, multiple DNS serversmay, of course, be monitored, but both the RX and TX network directions must bemonitored since the sensor tracks query/response state.
By default, the total number of entries in the query table is limited and a hardmemory limit of 512 MB is enforced on the Passive DNS sensor process. CPUutilization by the DNS sensor tends to be fairly low, even on heavily loadedrecursive servers.
It’s easy! If you would like to contribute data to the Farsight Passive DNSproject, or if you have any questions, please send an email to [email protected]
Please also check out our Passive DNS Sensor FAQ.
Joe St Sauver, Ph.D. is a Distributed System Scientist for FarsightSecurity, Inc.