[162049] in North American Network Operators' Group
Re: Open Resolver Problems
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Apr 1 15:00:49 2013
To: Tony Finch <dot@dotat.at>
In-Reply-To: Your message of "Mon, 01 Apr 2013 19:40:03 +0100."
<28E62B39-8102-413A-A11F-62D8BC6CEF65@dotat.at>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 01 Apr 2013 14:59:35 -0400
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--==_Exmh_1364842775_1884P
Content-Type: text/plain; charset=us-ascii
On Mon, 01 Apr 2013 19:40:03 +0100, Tony Finch said:
> You should be able to get a reasonable sample of IPv6 resolvers from the query
> logs of a popular authoritative server.
Hopefully, said logs are not easily accessible to the miscreants.
(I still expect the most feasible method for the miscreants is to start a
botnet and see what boxes get handed an IPv6 DNS via dhcp6).
--==_Exmh_1364842775_1884P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iQIVAwUBUVnZFgdmEQWDXROgAQKmvg/+KpdYf501/UdQ4TQqvPrf8OyjiHuxncb7
uGvXLU42Ep+oqFMONrOxHolmzlFqKbQBE5WGn5UCdR/VwXWiEOT/5ONqlMq5N0Pk
YPG5j3y7C3MBGlmjPW0kfOwIBgZlqcyTBqQbLp9WjsmG1Vi2U/9OAW3L16nw9Xmt
aGzn4gOnMSmnyvhgv0sbY6xXLAH3KUxOGHy1wNvi1c/Gt2LmUjxjuX4JWw/of2GY
/pLLqXLLQ0b6UOAuKeIgN9nolCeylQevvunV4kWcN6TfpefSy3KJzk1m46klBBC4
yZDzmiT61PE7gUVp8JdshnJYvLyROUISZ8b9UohN6aBqHKweQHAI5TlDMg4ecD72
gSvgZ3ARw130UeVrvwcorS0yb9hhPzYNekRTwPBwIViWcr8OMfHO568RhgeZrcro
q75WJlLAlL80r2XXWNli7OI6uLcps34K0SdB6MPoKzymvCbulo/H0TuUhN2+ag6Z
IesCaPHhAkVNVKkuazZ//Cy5K8X8pjgNae99aZLpk8HytzCEPhBs/bGFAB+GWLio
ZvDL89VJt/PaWqWxzWGUzObYISfl88wMVVx/5rt8xzgZYCOkJU9J85MVmqddRCpu
TNnKEyELNn7qNOfFGH1GXXLHr0KcBlkG3UXQikR/ZGVmRehNr0GBeia5q/qP+fhH
4kYCqgsI5EI=
=9t9s
-----END PGP SIGNATURE-----
--==_Exmh_1364842775_1884P--