On-going Internet Emergency and Domain Names (kill this thread)

Roland Dobbins rdobbins at cisco.com
Sun Apr 1 05:49:23 UTC 2007



On Mar 31, 2007, at 11:16 PM, william(at)elan.net wrote:

>  But DNS here is just a tool, bad guys could
> easily build quite complex system of control by using active HTTP
> such as XML-RPC, they are just not that sophisticated (yet) or
> maybe they don't need anything but simple list of pointers.

Actually, the discussion isn't about the use of the DNS protocol  
itself as a botnet C&C channel (as you indicate, that's certainly  
doable), but rather about domains used as pointers to malware which  
is then distributed via various methods, same for phishing, as well  
as the use of DNS to provide server agility for botnet controllers  
irrespective of the actual protocol used for C&C.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins at cisco.com> // 408.527.6376 voice

         Words that come from a machine have no soul.

                       -- Duong Van Ngo




More information about the NANOG mailing list