What does “dig .” actually query and where are those IPs coming from?












4















Out of curiosity, I entered dig . today. To my surprise, I got an IP:



$ dig .

; <<>> DiG 9.10.3-P4-Ubuntu <<>> .
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45964
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;. IN A

;; ANSWER SECTION:
. 291 IN A 172.217.23.174

;; Query time: 150 msec
;; SERVER: 10.0.0.138#53(10.0.0.138)
;; WHEN: Fri Feb 22 18:03:53 STD 2019
;; MSG SIZE rcvd: 33


Now, this IP seems to belong to Google, and http://172.217.23.174/ actually redirects to http://www.google.com/.



However, trying this repeatedly gave me different IPs: 52.95.34.225 (Amazon), 157.240.1.13 (Facebook), 52.114.128.9 (Microsoft), 23.195.9.143 (Akamai), and others... (this actually reads like the who-is-who of Internet companies!)



Googling each of them never revealed anything special other than the organization they belong to.



So, now I'm even more curious: Where are these IPs coming from? And what does dig . actually do? It seems to query the "DNS root" which, as I understand, shouldn't have random A records...










share|improve this question





























    4















    Out of curiosity, I entered dig . today. To my surprise, I got an IP:



    $ dig .

    ; <<>> DiG 9.10.3-P4-Ubuntu <<>> .
    ;; global options: +cmd
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45964
    ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

    ;; QUESTION SECTION:
    ;. IN A

    ;; ANSWER SECTION:
    . 291 IN A 172.217.23.174

    ;; Query time: 150 msec
    ;; SERVER: 10.0.0.138#53(10.0.0.138)
    ;; WHEN: Fri Feb 22 18:03:53 STD 2019
    ;; MSG SIZE rcvd: 33


    Now, this IP seems to belong to Google, and http://172.217.23.174/ actually redirects to http://www.google.com/.



    However, trying this repeatedly gave me different IPs: 52.95.34.225 (Amazon), 157.240.1.13 (Facebook), 52.114.128.9 (Microsoft), 23.195.9.143 (Akamai), and others... (this actually reads like the who-is-who of Internet companies!)



    Googling each of them never revealed anything special other than the organization they belong to.



    So, now I'm even more curious: Where are these IPs coming from? And what does dig . actually do? It seems to query the "DNS root" which, as I understand, shouldn't have random A records...










    share|improve this question



























      4












      4








      4








      Out of curiosity, I entered dig . today. To my surprise, I got an IP:



      $ dig .

      ; <<>> DiG 9.10.3-P4-Ubuntu <<>> .
      ;; global options: +cmd
      ;; Got answer:
      ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45964
      ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

      ;; QUESTION SECTION:
      ;. IN A

      ;; ANSWER SECTION:
      . 291 IN A 172.217.23.174

      ;; Query time: 150 msec
      ;; SERVER: 10.0.0.138#53(10.0.0.138)
      ;; WHEN: Fri Feb 22 18:03:53 STD 2019
      ;; MSG SIZE rcvd: 33


      Now, this IP seems to belong to Google, and http://172.217.23.174/ actually redirects to http://www.google.com/.



      However, trying this repeatedly gave me different IPs: 52.95.34.225 (Amazon), 157.240.1.13 (Facebook), 52.114.128.9 (Microsoft), 23.195.9.143 (Akamai), and others... (this actually reads like the who-is-who of Internet companies!)



      Googling each of them never revealed anything special other than the organization they belong to.



      So, now I'm even more curious: Where are these IPs coming from? And what does dig . actually do? It seems to query the "DNS root" which, as I understand, shouldn't have random A records...










      share|improve this question
















      Out of curiosity, I entered dig . today. To my surprise, I got an IP:



      $ dig .

      ; <<>> DiG 9.10.3-P4-Ubuntu <<>> .
      ;; global options: +cmd
      ;; Got answer:
      ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45964
      ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

      ;; QUESTION SECTION:
      ;. IN A

      ;; ANSWER SECTION:
      . 291 IN A 172.217.23.174

      ;; Query time: 150 msec
      ;; SERVER: 10.0.0.138#53(10.0.0.138)
      ;; WHEN: Fri Feb 22 18:03:53 STD 2019
      ;; MSG SIZE rcvd: 33


      Now, this IP seems to belong to Google, and http://172.217.23.174/ actually redirects to http://www.google.com/.



      However, trying this repeatedly gave me different IPs: 52.95.34.225 (Amazon), 157.240.1.13 (Facebook), 52.114.128.9 (Microsoft), 23.195.9.143 (Akamai), and others... (this actually reads like the who-is-who of Internet companies!)



      Googling each of them never revealed anything special other than the organization they belong to.



      So, now I'm even more curious: Where are these IPs coming from? And what does dig . actually do? It seems to query the "DNS root" which, as I understand, shouldn't have random A records...







      dns dig






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Feb 24 at 22:22







      CherryDT

















      asked Feb 22 at 16:13









      CherryDTCherryDT

      31518




      31518






















          1 Answer
          1






          active

          oldest

          votes


















          2














          Yes, . refers to the DNS "root". Yes, . is not supposed to have any record types other than NS and SOA (plus DNSSEC-related RRSIG/DNSKEY if you query with the +dnssec option).



          So in this case, you're sending the queries to 10.0.0.138 (which is a private address in your LAN), and it's sending you completley made-up replies. You should investigate who owns that host on your LAN, and why it's configured as your DNS server to begin with.



          (Interestingly, it still includes the ad (authenticated data) flag, implying that it had DNSSEC-verified the records before responding, which is just more lies and a reminder to not trust the 'ad' flag.)






          share|improve this answer


























          • 10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

            – CherryDT
            Feb 24 at 22:20






          • 1





            Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

            – CherryDT
            Feb 24 at 22:27











          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "3"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1408532%2fwhat-does-dig-actually-query-and-where-are-those-ips-coming-from%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          2














          Yes, . refers to the DNS "root". Yes, . is not supposed to have any record types other than NS and SOA (plus DNSSEC-related RRSIG/DNSKEY if you query with the +dnssec option).



          So in this case, you're sending the queries to 10.0.0.138 (which is a private address in your LAN), and it's sending you completley made-up replies. You should investigate who owns that host on your LAN, and why it's configured as your DNS server to begin with.



          (Interestingly, it still includes the ad (authenticated data) flag, implying that it had DNSSEC-verified the records before responding, which is just more lies and a reminder to not trust the 'ad' flag.)






          share|improve this answer


























          • 10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

            – CherryDT
            Feb 24 at 22:20






          • 1





            Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

            – CherryDT
            Feb 24 at 22:27
















          2














          Yes, . refers to the DNS "root". Yes, . is not supposed to have any record types other than NS and SOA (plus DNSSEC-related RRSIG/DNSKEY if you query with the +dnssec option).



          So in this case, you're sending the queries to 10.0.0.138 (which is a private address in your LAN), and it's sending you completley made-up replies. You should investigate who owns that host on your LAN, and why it's configured as your DNS server to begin with.



          (Interestingly, it still includes the ad (authenticated data) flag, implying that it had DNSSEC-verified the records before responding, which is just more lies and a reminder to not trust the 'ad' flag.)






          share|improve this answer


























          • 10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

            – CherryDT
            Feb 24 at 22:20






          • 1





            Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

            – CherryDT
            Feb 24 at 22:27














          2












          2








          2







          Yes, . refers to the DNS "root". Yes, . is not supposed to have any record types other than NS and SOA (plus DNSSEC-related RRSIG/DNSKEY if you query with the +dnssec option).



          So in this case, you're sending the queries to 10.0.0.138 (which is a private address in your LAN), and it's sending you completley made-up replies. You should investigate who owns that host on your LAN, and why it's configured as your DNS server to begin with.



          (Interestingly, it still includes the ad (authenticated data) flag, implying that it had DNSSEC-verified the records before responding, which is just more lies and a reminder to not trust the 'ad' flag.)






          share|improve this answer















          Yes, . refers to the DNS "root". Yes, . is not supposed to have any record types other than NS and SOA (plus DNSSEC-related RRSIG/DNSKEY if you query with the +dnssec option).



          So in this case, you're sending the queries to 10.0.0.138 (which is a private address in your LAN), and it's sending you completley made-up replies. You should investigate who owns that host on your LAN, and why it's configured as your DNS server to begin with.



          (Interestingly, it still includes the ad (authenticated data) flag, implying that it had DNSSEC-verified the records before responding, which is just more lies and a reminder to not trust the 'ad' flag.)







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Feb 22 at 19:43

























          answered Feb 22 at 19:30









          grawitygrawity

          242k37510567




          242k37510567













          • 10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

            – CherryDT
            Feb 24 at 22:20






          • 1





            Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

            – CherryDT
            Feb 24 at 22:27



















          • 10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

            – CherryDT
            Feb 24 at 22:20






          • 1





            Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

            – CherryDT
            Feb 24 at 22:27

















          10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

          – CherryDT
          Feb 24 at 22:20





          10.0.0.138 is the DSL router and it appears to be a NetGear Genie VEGN2610. It didn't occur to me that the router could be lying to me. Interesting bug, I wonder where it gets those IPs from and if this has any security implications.

          – CherryDT
          Feb 24 at 22:20




          1




          1





          Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

          – CherryDT
          Feb 24 at 22:27





          Further tests showed that this gives a copy of the answer of the last DNS query. Not interesting security-wise though since I could simply sniff the query packet from the network.

          – CherryDT
          Feb 24 at 22:27


















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Super User!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1408532%2fwhat-does-dig-actually-query-and-where-are-those-ips-coming-from%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Probability when a professor distributes a quiz and homework assignment to a class of n students.

          Aardman Animations

          Are they similar matrix