[dns-operations] responding to spoofed ANY queries
Frank Bulk
frnkblk at iname.com
Sun Jan 13 04:18:30 UTC 2013
If the problem is amplification, why not only perform RRL on only those DNS
communications exchanges that have certain amplification factor (i.e. 1.5).
Frank
-----Original Message-----
From: dns-operations-bounces at lists.dns-oarc.net
[mailto:dns-operations-bounces at lists.dns-oarc.net] On Behalf Of SM
Sent: Thursday, January 10, 2013 8:34 AM
To: ggm at apnic.net
Cc: dns-operations at lists.dns-oarc.net
Subject: Re: [dns-operations] responding to spoofed ANY queries
Hi George,
At 01:53 10-01-2013, George Michaelson wrote:
>What makes you think they won't? I mean, isn't this a classic
>mistake of cold war defense modelling, that you assume your enemy
>will use weapons you can confidently defend against and ignore the
>ones you suspect you cannot?
There are parallels with antispam. The current suspect (ANY queries)
will be considered as bad. Abusers will move to the next low-hanging
fruit [1]. I would have to do something about the low-hanging fruit
if it turns into an operational problem.
The problem is amplification. It can only be mitigated.
Regards,
-sm
1.
https://lists.dns-oarc.net/pipermail/dns-operations/2006-March/000135.html
_______________________________________________
dns-operations mailing list
dns-operations at lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
More information about the dns-operations
mailing list