[175940] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Reporting DDOS reflection attacks

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Sat Nov 8 21:33:20 2014

X-Original-To: nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: nanog@nanog.org
Date: Sun, 09 Nov 2014 09:33:06 +0700
In-Reply-To: <8F12CCCA-6B91-44B6-B0D8-8AEF0E1BC7E9@gmail.com>
Errors-To: nanog-bounces@nanog.org


On 9 Nov 2014, at 6:46, Yardiel D. Fuentes wrote:

> http://bcop.nanog.org/index.php/BCOP_Drafts

There are some good general recommendations in this document (Word 
format?  Really?), but this is incorrect and harmful, and should be 
removed:

	iii.	Consider dropping any DNS reply packets which are larger than 512 
Bytes – these are commonly found in DNS DoS Amplification attacks.

This *breaks the Internet*.  Don't do it.

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post