[161695] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open Resolver Problems

daemon@ATHENA.MIT.EDU (Nick Hilliard)
Mon Mar 25 12:57:05 2013

X-Envelope-To: nanog@nanog.org
Date: Mon, 25 Mar 2013 16:51:44 +0000
From: Nick Hilliard <nick@foobar.org>
To: ahebert@pubnix.net
In-Reply-To: <51507CCA.60901@pubnix.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 25/03/2013 16:35, Alain Hebert wrote:
>     That might be just me, but I find those peers allowing their
> customers to spoof source IP addresses more at fault.

that is equally stupid and bad.

>     PS: Some form of adaptive rate limitation works for it btw =D

no, it doesn't.  In order to ensure that your resolver clients are serviced
properly, you need to keep the DNS query rate high enough that if someone
has a large bcp38-enabled botnet, they can trash the hell out of whoever
they want.

The best solution is to disable open recursion completely, and police your
clients regularly.

Nick



home help back first fref pref prev next nref lref last post