[98388] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: large organization nameservers sending icmp packets to dns

daemon@ATHENA.MIT.EDU (Donald Stahl)
Tue Aug 7 14:20:55 2007

Date: Tue, 7 Aug 2007 14:14:11 -0400 (EDT)
From: Donald Stahl <don@calis.blacksun.org>
To: "Jason J. W. Williams" <williamsjj@digitar.com>
Cc: Valdis.Kletnieks@vt.edu, John Levine <johnl@iecc.com>, nanog@nanog.org
In-Reply-To: <D7D0907E265A834D995B9B4FC0078D4E76AD7B@aristotle.boi.corp.us.digitar.com>
Errors-To: owner-nanog@merit.edu


> All things being equal (which they're usually not) you could use the ACK
> response time of the TCP handshake if they've got TCP DNS resolution
> available. Though again most don't for security reasons...
Then most are incredibly stupid.

Several anti DoS utilities force unknown hosts to initiate a query via 
TCP in order to be whitelisted. If the host can't perform a TCP query then 
they get blacklisted.

In addition, any UDP truncated response needs to be retried via TCP- 
blocking it would cause a variety of problems.

-Don

home help back first fref pref prev next nref lref last post