I am putting the finishing touches on a presentation I will be making later 
this week at the DNS-OARC meeting, but I also wanted to ask anyone here if they 
had data/ideas of items they are interested in seeing from the Open Resolver 
Project.

We perform a weekly scan of the IPv4 space looking for DNS servers that can be 
used in an amplification attack. 

Some interesting data: about 46% of the IPs that respond to a DNS query do not 
respond from port 53, meaning they are "broken" in some interesting way.

I encourage folks to check your IP space here:

http://openresolverproject.org/

You can also e-mail the project to get direct access to per-ASN reports.  That 
email needs to come from a contact in the RIR object, or from a corporate 
address that can be easily identified as related to your org.

If you are an ISAC or similar, we can also assist you.

Thanks,

- jared

Reply via email to