[53156] in North American Network Operators' Group
Re: who are the root server operators?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Nov 4 12:48:50 2002
To: Joe Baptista <baptista@dot-god.com>
Cc: nanog <nanog@merit.edu>
In-Reply-To: Your message of "Mon, 04 Nov 2002 12:32:06 EST."
<Pine.LNX.4.33.0211041227570.32223-100000@dot-god.com>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 04 Nov 2002 12:47:40 -0500
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_2059031132P
Content-Type: text/plain; charset=us-ascii
On Mon, 04 Nov 2002 12:32:06 EST, Joe Baptista said:
> If the roots are once again under attack - how will the root server
> operators be contacted by a frustrated isp who can't resolve.
The chances of a frustrated isp being unable to resolve things during a DDoS
attack and the root operators not already knowing about it are a lot lower
than the chances that the root operators will be deluged with mail from
frustrated ISPs who can't figure out why queries originating in RFC1918
space don't get answered.
And remember - Paul Vixie has shown that 10% of the inbound traffic at
c.root-server.net is bogus rfc1918 sourced. Making the addresses public
will serve as a DDoS vector against the root operators....
--
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech
--==_Exmh_2059031132P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE9xrK7cC3lWbTT17ARAoEQAJ4zhTHoR8Hfeaw6tdNY3RQ+eoaX8QCdFImL
MWHxAUvpRDwVZxtsg2/H0Gs=
=hcla
-----END PGP SIGNATURE-----
--==_Exmh_2059031132P--