DOS attack against DNS?

Joel Jaeggli joelja at darkwing.uoregon.edu
Mon Jan 16 17:52:13 UTC 2006


On Mon, 16 Jan 2006, Paul Vixie wrote:

>
> Mark_Andrews at isc.org (Mark Andrews) writes:
>
>> 	For repeat offenders create a list of networks that won't
>> 	implement BCP 38 and collectively de-peer with them telling
>> 	them why you are de-peering and what is required to
>> 	re-establish connectivity.  It is in everyones interests
>> 	to do the right thing here.
>
> people inside one of the largest networks have told me that they have
> customers who require the ability to bypass BCP38 restrictions, and that
> they will therefore never be fully BCP38 compliant.  i've asked for BCP38
> to become the default on all their other present and future customers but
> then there was whining about bankruptcy, old outdated equipment, and so on.
> sadly, there's no way to de-peer this network, or any other multinational,
> and so there will be no "peer pressure" on them to implement BCP38.

Consider people in the rest of the world who may purchase simplex 
satellite links. By definition they inject traffic in places they aren't 
announcing their route from.

> so, it's either not in everyone's interests to do the right thing, or there
> is still a huge variance in what's considered "the right thing".  either
> way, we're (the internet is) SCREWED until we (that's "we all") fix this.
>
> (if you're not seeing spoofed-source attacks, bully for you!  i didn't see
> one today, either, but leaving this tool in the bad-guy toolbox makes us all
> unsafe, no matter how much or how little they may be using it this day/year.)
>

-- 
--------------------------------------------------------------------------
Joel Jaeggli  	       Unix Consulting 	       joelja at darkwing.uoregon.edu
GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




More information about the NANOG mailing list