[53156] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: who are the root server operators?

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Nov 4 12:48:50 2002

To: Joe Baptista <baptista@dot-god.com>
Cc: nanog <nanog@merit.edu>
In-Reply-To: Your message of "Mon, 04 Nov 2002 12:32:06 EST."
             <Pine.LNX.4.33.0211041227570.32223-100000@dot-god.com> 
From: Valdis.Kletnieks@vt.edu
Date: Mon, 04 Nov 2002 12:47:40 -0500
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_2059031132P
Content-Type: text/plain; charset=us-ascii

On Mon, 04 Nov 2002 12:32:06 EST, Joe Baptista said:

> If the roots are once again under attack - how will the root server
> operators be contacted by a frustrated isp who can't resolve.

The chances of a frustrated isp being unable to resolve things during a DDoS
attack and the root operators not already knowing about it are a lot lower
than the chances that the root operators will be deluged with mail from
frustrated ISPs who can't figure out why queries originating in RFC1918
space don't get answered.

And remember - Paul Vixie has shown that 10% of the inbound traffic at
c.root-server.net is bogus rfc1918 sourced.  Making the addresses public
will serve as a DDoS vector against the root operators....
-- 
				Valdis Kletnieks
				Computer Systems Senior Engineer
				Virginia Tech


--==_Exmh_2059031132P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE9xrK7cC3lWbTT17ARAoEQAJ4zhTHoR8Hfeaw6tdNY3RQ+eoaX8QCdFImL
MWHxAUvpRDwVZxtsg2/H0Gs=
=hcla
-----END PGP SIGNATURE-----

--==_Exmh_2059031132P--

home help back first fref pref prev next nref lref last post