[143144] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS DoS ???

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Sat Jul 30 18:54:11 2011

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Sat, 30 Jul 2011 22:53:24 +0000
In-Reply-To: <CAAAwwbU75EgK6AZ_BvXjR7rig0p8kZhmGU__K_-4so5snUzYyA@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Jul 31, 2011, at 3:08 AM, Jimmy Hess wrote:

> A good example, would be services  such as OpenDNS.

One can argue a) that services like OpenDNS aren't necessarily a Good Thing=
 when run by those who don't take the proper precautions and b) that OpenDN=
S in particular is run by smart, responsible folks who take extra measures =
to ensure they don't become a party to DNS reflection/amplification attacks=
, even though they operate an open recursive lookup service.

;>

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

		The basis of optimism is sheer terror.

			  -- Oscar Wilde



home help back first fref pref prev next nref lref last post