[150253] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS Attacks

daemon@ATHENA.MIT.EDU (Tei)
Mon Feb 20 10:39:20 2012

In-Reply-To: <CAMhuimj6QLwtqiJYesxoH13PCoLK+Sb1ohRvH27HCDfmOjZJkw@mail.gmail.com>
From: Tei <oscar.vives@gmail.com>
Date: Mon, 20 Feb 2012 16:38:00 +0100
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

I am a mere user, so I all this stuff sounds to me like giberish.

The right solution is to capture the request to these DNS servers, and
send to a custom server with a static message  "warning.html". Nothing
fancy.   With a phone number to "get out of jail", so people can call
to "op-out" of this thing, so can browse the internet to search for a
solution.

This or do nothing.

http://www.guardian.co.uk/world/2012/jan/18/iran-death-sentence-porn-progra=
mmer
Interpol helps Iran capture a programmer for creating porn sites.

Now, if the Interpol want you to block a DNS server, or worse, to spy
on users conecting to a DNS server. Will you help?  doing nothing is
also a good option, methinks.  Start medling, redirecting dns trafic,
spyiing on the user... all these things are dirty and can't end well.

(note, of course, I am a user, so I have a user opinion. )



--=20
--
=E2=84=B1in del =E2=84=B3ensaje.


home help back first fref pref prev next nref lref last post