[170598] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: new DNS forwarder vulnerability

daemon@ATHENA.MIT.EDU (Mark Allman)
Wed Apr 2 08:38:40 2014

To: Paul Ferguson <fergdawgster@mykolab.com>
From: Mark Allman <mallman@icir.org>
In-Reply-To: <53248184.7050404@mykolab.com> 
Date: Wed, 02 Apr 2014 08:38:09 -0400
Cc: nanog@nanog.org
Reply-To: mallman@icir.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

----------ma1197-1
Content-Type: text/plain
Content-Disposition: inline


[catching up]

> That's a good question, but I know that during the ongoing survey
> within the Open Resolver Project [http://openresolverproject.org/],
> Jared found thousands of CPE devices which responded as resolvers.

Not thousands, *tens of millions*.

Our estimate from mid-2013 was 32M such devices (detailed in an IMC
paper last year; http://www.icir.org/mallman/pubs/SCRA13/).  And, that
roughly agrees with both the openresolverproject.org numbers and another
(not public) study I know of.  And, as if that isn't bad enough
... there is a 2010 IMC paper that puts the number at 15M.  I.e., the
instances of brokenness are getting worse---doubling in 3 years!  UGH.

allman




----------ma1197-1
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (Darwin)

iEYEARECAAYFAlM8BLAACgkQWyrrWs4yIs7bHQCgi4EdVvi2kYLH/bTk/OxEdH6e
AiQAn3UIbmkRe6ilr2wl1PtaiqtPv1Ox
=VEcX
-----END PGP SIGNATURE-----
----------ma1197-1--


home help back first fref pref prev next nref lref last post