[151968] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS noise

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Fri Apr 6 14:09:02 2012

In-Reply-To: <CAJAdsDkqxoe-=0wiC84u1KJEyZUqWesw5o5k3VkFzgbuWxpLew@mail.gmail.com>
Date: Fri, 6 Apr 2012 13:08:31 -0500
From: Jimmy Hess <mysidia@gmail.com>
To: PC <paul4004@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, Apr 6, 2012 at 12:52 PM, PC <paul4004@gmail.com> wrote:
> Of course you'd have to actually be running a poorly configured DNS server
> on that IP for this to work...

Right....  was that IP ever running a DNS service?

Picking random IPs to spoof and hope some of the random IPs happen to
be DNS servers
doesn't sound like a very "efficient" attack.    It seems like the
attacker would want to
'probe first'   before selecting innocent servers to reflect at

Perhaps 2 or 3%  of  the  possible random IPs on the internet actually
run DNS servers
that could possibly respond to spoofed queries?

--
-JH


home help back first fref pref prev next nref lref last post