Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Last month's root-server attack revisited

Net safe thanks to technology called Anycast


Last month's attack on at least six of the net's root servers was formidable, but thanks to the implementation of a technology designed to protect the infrastructure, only two were affected, according to a factsheet issued today by ICANN.

The DDoS attack flooded the servers with a stunning amount of data, as much as 1 Gbps at points, according to the oversight group. But damage was relatively contained thanks to new load-balancing technology called Anycast, which was installed on all the servers that came under fire, except for the two that sustained damage.

"Anycast allows a number of servers in different places to act as if they are in the same place," according to the document. "So while there remains 13 locations on the network for root serves, the reality on the ground is that not only are there often dozens at one spot but dozens of servers in other locations that can also deal with requests."

That allows the servers - which translate domain names such as theregister.com into IP numbers such as 72.3.246.59 - to distribute large volumes of data evenly among many machines (a many-hands-make-light-work approach, if you will). Anycast also safeguards against damage that could be caused by natural disasters by geographically dispersing servers.

The attack was, in fact, two forays, one that started at 4AM California time on Feb. 6 and lasted for two-and-a-half hours, and the other, a five-hour assault that started several hours after the first one stopped. That torrent of packets originated from hundreds of zombies, so it's impossible to know where in the world the attackers were located. Educated guesses lead engineers to believe they came from the Asia Pacific, possibly in Korea.

Of the two servers that sustained damage, one was the g-root, which is operated by US Department of Defense and is physically located in Ohio, and the other was the l-root, run by ICANN and based in California. ICANN attributed the damage they sustained to the absence of Anycast.

In addition to those two root servers, three others also are not using the technology. Engineers have held off installing it universally because some worried there could be risks associated with making different servers appear to be coming from the same place. "And so just a few root servers tried the system first, tested it thoroughly and ironed out any bugs before the next set moved over," the report explained. (Note: In previous versions of this story, we misread the report to say the delay was based on root servers using different OSes. This is not the case.)

After last month's episode, it's likely the remaining servers - which in addition to roots G and L also include roots D, E and H - will adopt the technology soon. ®

Broader topics

Narrower topics


Other stories you might like

  • Bosses using AI to hire candidates risk discriminating against disabled applicants
    US publishes technical guide to help organizations avoid violating Americans with Disabilities Act

    The Biden administration and Department of Justice have warned employers using AI software for recruitment purposes to take extra steps to support disabled job applicants or they risk violating the Americans with Disabilities Act (ADA).

    Under the ADA, employers must provide adequate accommodations to all qualified disabled job seekers so they can fairly take part in the application process. But the increasing rollout of machine learning algorithms by companies in their hiring processes opens new possibilities that can disadvantage candidates with disabilities. 

    The Equal Employment Opportunity Commission (EEOC) and the DoJ published a new document this week, providing technical guidance to ensure companies don't violate ADA when using AI technology for recruitment purposes.

    Continue reading
  • How ICE became a $2.8b domestic surveillance agency
    Your US tax dollars at work

    The US Immigration and Customs Enforcement (ICE) agency has spent about $2.8 billion over the past 14 years on a massive surveillance "dragnet" that uses big data and facial-recognition technology to secretly spy on most Americans, according to a report from Georgetown Law's Center on Privacy and Technology.

    The research took two years and included "hundreds" of Freedom of Information Act requests, along with reviews of ICE's contracting and procurement records. It details how ICE surveillance spending jumped from about $71 million annually in 2008 to about $388 million per year as of 2021. The network it has purchased with this $2.8 billion means that "ICE now operates as a domestic surveillance agency" and its methods cross "legal and ethical lines," the report concludes.

    ICE did not respond to The Register's request for comment.

    Continue reading
  • Fully automated AI networks less than 5 years away, reckons Juniper CEO
    You robot kids, get off my LAN

    AI will completely automate the network within five years, Juniper CEO Rami Rahim boasted during the company’s Global Summit this week.

    “I truly believe that just as there is this need today for a self-driving automobile, the future is around a self-driving network where humans literally have to do nothing,” he said. “It's probably weird for people to hear the CEO of a networking company say that… but that's exactly what we should be wishing for.”

    Rahim believes AI-driven automation is the latest phase in computer networking’s evolution, which began with the rise of TCP/IP and the internet, was accelerated by faster and more efficient silicon, and then made manageable by advances in software.

    Continue reading

Biting the hand that feeds IT © 1998–2022