[161744] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open Resolver Problems

daemon@ATHENA.MIT.EDU (Nick Hilliard)
Tue Mar 26 11:38:32 2013

X-Envelope-To: nanog@nanog.org
Date: Tue, 26 Mar 2013 15:38:20 +0000
From: Nick Hilliard <nick@foobar.org>
To: ahebert@pubnix.net
In-Reply-To: <5151B987.50302@pubnix.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 26/03/2013 15:06, Alain Hebert wrote:
>     And why not targeting all that animosity to the peers allowing
> source IP spoofing?

I do - and I gave a bunch of talks in europistan over the last 12 months
which included explicit encouragement, practice and configuration for
implementing BCP38 as part of real-time black hole system deployment.

>     DNS Servers don't attack you, people letting their customers spoof
> source IP do.

DNS amp packets attack me.  Please stop them from leaving your network, and
I will both implement BCP38 and encourage others to do so. Thank you.

Nick



home help back first fref pref prev next nref lref last post