[96647] in North American Network Operators' Group
Re: Interesting new dns failures
daemon@ATHENA.MIT.EDU (Chris L. Morrow)
Mon May 21 00:43:44 2007
Date: Mon, 21 May 2007 04:42:11 +0000 (GMT)
From: "Chris L. Morrow" <christopher.morrow@verizonbusiness.com>
In-reply-to: <20070520211122.I32001@ubfganzr>
To: Roger Marquis <marquis@roble.com>
Cc: nanog@merit.edu
Errors-To: owner-nanog@merit.edu
On Sun, 20 May 2007, Roger Marquis wrote:
> > If not, have any root nameservers been hacked?
>
> To partly answer my own question, no. The data returned by root
> (gtld) nameservers is not changing rapidly. Thanks for the pointers
> to "fast flux" too. Wasn't familiar with this attack or terminology.
>
> All the same, it would seem to be an easy and cheap abuse to address,
> at the gtlds. Why are these obvious trojans are being propagated by
> the root servers anyhow?
the root servers are responsible how exactly for the fast-flux issues?
Also, there might be some legittimate business that uses something like
the FF techniques... but, uhm... how are the root servers involved again?