istinfo/dns-operations
Almost certainly some *.gov dns admins lurking there.
Cheers,
Nate Itkin
r network engineers made some adjustments to the DOS
countermeasures acquired after last week's incident, and that seems to have
stabilized traffic flow. We apologize for the inconvenience. -Ben Larsen
Hurricane Electric Internet Services"
Some supporting evidence would be nice.
- Nate Itkin
Often presented with an alternate spelling from those of us who
had to live with it.
On Tue, Oct 21, 2014 at 01:44:17PM -0700, Eric Brunner-Williams wrote:
> >systemd is insanity.
>
> see also smit.
Looking at San Diego. Suspecting an issue with Google DNS.
Google--> dig @8.8.8.8 cities.l.craigslist.org. +short
74.63.219.135
My resolver--> dig cities.l.craigslist.org. +short
208.82.238.226
Authoritative--> dig @208.82.236.210 cities.l.craigslist.org. +short +norec
208.82.236.242
On Sun, N
g inbound PTR queries from
various hosts on 10.0.0.0/8 (which are blackholed by my DNS servers).
They receive no response, yet they persist. Anyone have thoughts on their
part in the scheme?
Best wishes,
Nate Itkin
Agree. Thank you for catching that. I should have elaborated that one
must be very judicious about adding ACLs for the reasons you mentioned.
One of the DOS victims had explicitly said not to expect queries from two
of the recent targets, but yeah, not necessarily a good plan in the general
case.
Best wishes,
Nate Itkin
aution with assigning culpability.
Nate Itkin
Y resolving
'www.broadband.gov/A/IN': 192.104.54.4#53
I'll send e-mail to dns-admin-at-fcc.gov, but that's probably a black
hole. If anyone has a contact at fcc.gov, please let them know.
Nate Itkin
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBC
op antenna
so I needed the CDMA receiver.
http://www.endruntechnologies.com/network-time-server.htm
Nate Itkin
9 matches
Mail list logo