DNS Flag Day is a public-benefit movement, like a community trash pick up day in a common area everyone uses.
Everyone who has and will participate in supporting this initiative should feel they have accomplished something worthwhile. Some operators thought it was unwise that Flag Day was set for a Friday, and were taken by surprise by the level of user concern. Some of the Twitter posts were kind of silly and needlessly alarmist. Characterizing this as a “Flag Day” exaggerated how sudden the real change on the Internet would be, but the effect it had, of providing everyone with a goal date, achieved the objective. The DNS community as a whole did accomplish at least three things over the past year:
1) Approximately 4.8 million domains were tested in January alone, using the ednscomp.isc.org site.
We rate-limited the tester to 10 queries per second, to limit its potential as a DDoS tool. We averaged 2-3 tests per second for most of the month! About half of these, or 2312494 tests, were initiated through the dnsflagday.net site. This many people testing and validating their DNS implementation, has got to be good for the overall DNS hygiene.
2) Throughout the month of January, we saw significant improvement across the Alexa top 1 million domains.
Although we have seen gradual improvement over the past couple of years, that slow rate of improvement accelerated sharply as people saw the Flag Day deadline approaching. The chart below shows the most critical EDNS compatibility issue – servers that would not respond to a query that included an unknown EDNS(0) option. These were the servers that would appear to be unavailable after Flag Day.
This problem is almost always caused by firewalls blocking EDNS, and it was dramatically improved by Flag Day.
We saw significant improvement in the most important compatibility numbers for the Alexa top 1M sites in January. We were already at >96% success on these basic tests at the beginning of 2017, but fixing the last few percentage points was going very slowly. That accelerated sharply in January.
Country-Code Top Level Domains
The most wonderful thing was, a few top level domains tested all of their child domains and published reports about their compliance. We know that Switzerland, .ch, downloaded the ednscomp test tool and tested their domains a year or more ago. A few others who also have been working on improving EDNS compliance published compliance reports for Flag Day:
- NZ https://internetnz.nz/news/global-change-set-break-nz-domains
- CZ https://en.blog.nic.cz/2019/01/24/almost-all-cz-domains-are-ready-for-the-february-dns-maintenance/
3) Quite a few vendors and operators took notice and made progress.
A number of vendors, including firewall vendors and hosted service providers, tested their own products and services and published their status and plans to remedy remaining EDNS compatibility problems.
Microsoft Azure: https://azure.microsoft.com/en-us/updates/azure-dns-flag-day/
Palo Alto Networks firewall: https://live.paloaltonetworks.com/t5/Community-Blog/DNS-Flag-Day-Are-You-Ready/ba-p/248284
There were some balanced and informative news articles as well.
These are just a few of them:
Carsten Strotmann on Heise.de: https://www.heise.de/newsticker/meldung/DNS-flag-day-Initiative-gegen-veraltete-DNS-Server-und-Middleboxen-4289779.html
Cricket Liu on Tech Target: https://searchsecurity.techtarget.com/answer/Will-DNS-Flag-Day-affect-you-Infobloxs-Cricket-Liu-explains
Malaysian National Cyber Security: https://www.nacsa.gov.my/announce_dns.php
- Most of these links came from the DNSFLAGDAY site!