-----Original Message-----
From: rob.vercoute...@kpn.com [mailto:rob.vercoute...@kpn.com] 
Sent: Wednesday, November 30, 2011 3:05 PM
To: matlo...@exempla.org; richard.bar...@gmail.com; 
andrew.wall...@rocketmail.com
Cc: nanog@nanog.org; lel...@taranta.discpro.org
Subject: RE: Recent DNS attacks from China?

Yes it is, but the problem is that our servers are "attacking" the so called 
source address. All the answers are going back to the "source". It is huge 
amplification attacks. (some sort of smurf if you want) The ip addresses are 
spoofed (We did a capture and saw all different ttl's so coming from behind 
different hops) And yes we saw the ANY queries for all the domains.

I still wonder how it is still possible that ip addresses can be spoofed 
nowadays

=================

Rob,

Transit providers can bill for the denial of service traffic and they claim 
it's too expensive to run URPF because of the extra lookup.

-Drew

Reply via email to