I'm sure this must have been discussed at some point, somewhere.

The premise with regard to BCP38 + open resolvers is that the spoofed
packets reside on different networks than the resolvers. If these
resolvers are primarily CPE and other unmaintained equipment, then it
stands to reason that they reside inside networks containing other
equipment; and this equipment could be the source of the source-spoofed
(DNS) packets.

Reflecting traffic off of an open resolver on one's own network would
serve to cloak the true identity of the originator.

BCP38 filtering on egress from the network is ineffective in such
scenarios because it is based on the assumption that the spoofed packets
are coming in from outside the network (and hence originated as egress
from someone else's network).

If the good guys can map open resolvers, so can the bad guys. (There are
no "black hat" data scientists?)

If we know that spoofed port queries are traversing peering points, then
we know the networks they're coming from. If we don't know that, then see
above; if we can't shame them, see "Maginot Line".

--

Fred Morris

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to