-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In message <5411d5b6.8090...@isc.org>, Cathy Almond <cat...@isc.org>
writes

>There's a lot of this about.

I agree ... and I have some extensive measurements of it

>We did awhile back wonder if it was botnet-related, but I've not (yet)
>seen any persuasive evidence that it is.

I agree with the view that it's an attack on the authoritative server
and I have been told that it's pretty effective at that!

Although the attack could be done with a botnet or by reflecting traffic
off end-user equipment, many of the attacks I have seen involve source
IP spoofing. I deduce this by noting that a fairly large percentage of
the traffic comes from blocks of IPs that are not currently routed on
the open Internet.

I wonder the extent to which the end-user equipment is being blamed when
it's just routed IPs which are being used.

It would be interesting to confirm my observation (or at least segment
the attacks into those where this is a tactic).

- -- 
Dr Richard Clayton                         <richard.clay...@cl.cam.ac.uk>
                                  tel: 01223 763570, mobile: 07887 794090
                    Computer Laboratory, University of Cambridge, CB3 0FD

-----BEGIN PGP SIGNATURE-----
Version: PGPsdk version 1.7.1

iQA/AwUBVBHxPeINNVchEYfiEQKPRACg7yt9a9az8VQsiihd0cl2vgnOLnMAnini
FA9ZQDkDekigzaI5BaLP4MeQ
=Pj+P
-----END PGP SIGNATURE-----
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to