In message <ae105312-3108-4b0b-8445-7116b84ec...@arbor.net>, "Dobbins, Roland" 
writes:
> On Aug 1, 2011, at 7:42 AM, Mark Andrews wrote:
> 
> > Named already takes proper precautions by default.  Recursive service is =
> limited to directly connected networks by default.  The default
> > was first changed in 9.4 (2007) which is about to go end-of-life once the=
>  final wrap up release is done.
> 
> This alone isn't enough.  There are quite a few other things folks must do =
> from an architectural and operational standpoint which aren't found in name=
> d.conf.
> 
> > The real problem is that many ISP's don't do effective ingress/egress fil=
> tering.
> 
> Well, no.  The real problem is a protocol set/implementation which lends it=
> self so readily to spoofing in the first place, followed (as you say) by IS=
> P/endpoint network inattention to anti-spoofing, followed by protocols whic=
> h make use of the eminently-spoofable UDP for a critical service.

And even if DNS/TCP was use by default machines can still get DoS'd
because IP is spoofable.

This one looks like a direct attack on the machine as there are
multiple source addresses rather than a reflector attack unless they
are attempting to attack thousands of sites simultaniously.

> >  This prevents compromised machines impersonating other machines.
> 
> Concur, but see above - spoofing is the symptom, not the disease.
> 
> -----------------------------------------------------------------------
> Roland Dobbins <rdobb...@arbor.net> // <http://www.arbornetworks.com>
> 
>               The basis of optimism is sheer terror.
> 
>                         -- Oscar Wilde
> 
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org

Reply via email to