[169215] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: random dns queries with random sources

daemon@ATHENA.MIT.EDU (George Herbert)
Tue Feb 18 23:02:20 2014

In-Reply-To: <E45263C9-3256-46F6-B812-1CCFCFC387C1@arbor.net>
Date: Tue, 18 Feb 2014 19:49:36 -0800
From: George Herbert <george.herbert@gmail.com>
To: "Dobbins, Roland" <rdobbins@arbor.net>
Cc: North American Networking and Offtopic Gripes List <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Right.  Nonzero chances that you (Joe's site) are the target...

Also, check if you have egress filtering of spoofed addresses below these
DNS resources, between them and any user objects.  You could be sourcing
the spoofing if not...


On Tue, Feb 18, 2014 at 7:44 PM, Dobbins, Roland <rdobbins@arbor.net> wrote:

>
> On Feb 19, 2014, at 10:08 AM, Joe Maimon <jmaimon@ttec.com> wrote:
>
> > What is the purpose of this?
>
> Resource-exhaustion attack against the recursive DNS?
>
> -----------------------------------------------------------------------
> Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
>
>           Luck is the residue of opportunity and design.
>
>                        -- John Milton
>
>
>


-- 
-george william herbert
george.herbert@gmail.com

home help back first fref pref prev next nref lref last post