[161773] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open Resolver Problems

daemon@ATHENA.MIT.EDU (Alain Hebert)
Tue Mar 26 19:04:30 2013

Date: Tue, 26 Mar 2013 19:04:19 -0400
From: Alain Hebert <ahebert@pubnix.net>
To: nanog@nanog.org
In-Reply-To: <5151C0EC.7000008@foobar.org>
Reply-To: ahebert@pubnix.net
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

    Well,

 On 03/26/13 11:38, Nick Hilliard wrote:
> On 26/03/2013 15:06, Alain Hebert wrote:
>>     And why not targeting all that animosity to the peers allowing
>> source IP spoofing?
> I do - and I gave a bunch of talks in europistan over the last 12 months
> which included explicit encouragement, practice and configuration for
> implementing BCP38 as part of real-time black hole system deployment.
>
>>     DNS Servers don't attack you, people letting their customers spoof
>> source IP do.
> DNS amp packets attack me.  Please stop them from leaving your network, and
> I will both implement BCP38 and encourage others to do so. Thank you.
>
> Nick
    We're on it here...

    Been using the work of http://bindguard.activezone.de/ to watch it =D

    There is a lot of targets... kinda hard to figure out the goal...

-----
Alain Hebert                                ahebert@pubnix.net   
PubNIX Inc.        
50 boul. St-Charles
P.O. Box 26770     Beaconsfield, Quebec     H9W 6G7
Tel: 514-990-5911  http://www.pubnix.net    Fax: 514-990-9443




home help back first fref pref prev next nref lref last post