[162049] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Open Resolver Problems

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Apr 1 15:00:49 2013

To: Tony Finch <dot@dotat.at>
In-Reply-To: Your message of "Mon, 01 Apr 2013 19:40:03 +0100."
 <28E62B39-8102-413A-A11F-62D8BC6CEF65@dotat.at>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 01 Apr 2013 14:59:35 -0400
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

--==_Exmh_1364842775_1884P
Content-Type: text/plain; charset=us-ascii

On Mon, 01 Apr 2013 19:40:03 +0100, Tony Finch said:

> You should be able to get a reasonable sample of IPv6 resolvers from the query
> logs of a popular authoritative server.

Hopefully, said logs are not easily accessible to the miscreants.

(I still expect the most feasible method for the miscreants is to start a
botnet and see what boxes get handed an IPv6 DNS via dhcp6).

--==_Exmh_1364842775_1884P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
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=9t9s
-----END PGP SIGNATURE-----

--==_Exmh_1364842775_1884P--



home help back first fref pref prev next nref lref last post