[161723] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open Resolver Problems

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Tue Mar 26 08:16:15 2013

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Tue, 26 Mar 2013 12:15:52 +0000
In-Reply-To: <742FD6F7-6986-4916-9C9A-8012281F93D0@ianai.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Mar 26, 2013, at 7:07 PM, Patrick W. Gilmore wrote:

> To be more clear, the point of DNS reflection attacks is to amplify the a=
mount of bandwidth the botnet can muster (and perhaps hide the true source)=
.

Yes, hence the 'amplification' part.

;>

More than hiding the actual sources, I think it's more about making it diff=
icult (at first blush) for folks to seine out and filter the attack traffic=
 from the normal 'background radiation' of legitimate traffic.

> And far too many other things. :(

Good point - game servers, etc.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton



home help back first fref pref prev next nref lref last post