. (Parsimonious revelation of qnames during delegation
discovery may obscure the iterating recurisve targets, or complicate
their subversion by requiring whole-zone substitution by the
attacker.)
--
David Dagon
da...@sudo.sh
D970 6D9E E500 E877 B1E3 D3F8 5937 48DC 0FDC E717
act with what is described as the larger
"ICANN Internet", there certainly is a need for more robust
resolution. I encourage others to take a look and lend a hand.
--
David Dagon
da...@sudo.sh
D970 6D9E E500 E877 B1E3 D3F8 5937 48DC 0FDC E717
, and your paper (plus the lack of an
update path) suggests the need for network owner assistance in
detecting poisoning.
--
David Dagon
da...@sudo.sh
D970 6D9E E500 E877 B1E3 D3F8 5937 48DC 0FDC E717
___
dns-operations mailing list
dns-operations@list
ie at ntwk.msn.net,
so perhaps traffic volume is not the cause. (Though surely there's a
retry storm under way.) I note a few posts on forums, just a few
minutes old. So perhaps this is a recent development.
Is there someone on list who can contact Microsoft? (Surely they
know about this.)
ive for
assorted qtypes. If so, you would see (a) mostly open recursives
doing A6? queries, (b) perhaps other qytpes for the same qnames, close
in time, from the same open recursives.
If there are no other likely explanations, you might start with this
theory, and look for those symptoms.
--
Da