[96647] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Interesting new dns failures

daemon@ATHENA.MIT.EDU (Chris L. Morrow)
Mon May 21 00:43:44 2007

Date: Mon, 21 May 2007 04:42:11 +0000 (GMT)
From: "Chris L. Morrow" <christopher.morrow@verizonbusiness.com>
In-reply-to: <20070520211122.I32001@ubfganzr>
To: Roger Marquis <marquis@roble.com>
Cc: nanog@merit.edu
Errors-To: owner-nanog@merit.edu




On Sun, 20 May 2007, Roger Marquis wrote:

> > If not, have any root nameservers been hacked?
>
> To partly answer my own question, no.  The data returned by root
> (gtld) nameservers is not changing rapidly.  Thanks for the pointers
> to "fast flux" too.  Wasn't familiar with this attack or terminology.
>
> All the same, it would seem to be an easy and cheap abuse to address,
> at the gtlds.  Why are these obvious trojans are being propagated by
> the root servers anyhow?

the root servers are responsible how exactly for the fast-flux issues?
Also, there might be some legittimate business that uses something like
the FF techniques... but, uhm... how are the root servers involved again?

home help back first fref pref prev next nref lref last post