Re: DNS Amplification Attacks

2006-03-20 Thread Wayne E. Bouchard
On Fri, Mar 17, 2006 at 03:27:03PM -0800, [EMAIL PROTECTED] wrote: That ISPs still do not filter inbound traffic from their customers to prevent source spoofing is amazing. The fact that there are vendors out there that do not support RPF filtering is even more amazing. --- Wayne

Re: DNS Amplification Attacks

2006-03-20 Thread Gadi Evron
Geo. wrote: Recursion the way it is set now with most DNS implementations, is the problem being exploited by spoofing. It is true spoofing is bad for our health, but that does not mean we should ignore what actually gets exploited, which is recursive name servers open to the world. Fixing the

TDS - AS

2006-03-20 Thread Wallace Keith
Title: TDS - AS Is anyone else having issues getting to AS 4181? Seems like my route to them was withdrawn around 20:05 z. (64.35.192.0/20) (and yes, I DID open a ticket) -Keith

Re: DNS Amplification Attacks

2006-03-20 Thread Peter Dambier
Joseph S D Yao wrote: On Mon, Mar 20, 2006 at 11:30:46PM +0200, Gadi Evron wrote: ... Where did that come from? I respect you but please, let's have a technical discussion. This is important enough for us all to avoid the flame-wars for now. Don't move this thread to politics or lunacies.

RE: TDS - AS

2006-03-20 Thread Wallace Keith
Thanks for the correction :). Being rather self centered at times, it's the only prefix I care about. -Original Message- From: Arnold Nipper [mailto:[EMAIL PROTECTED] Sent: Monday, March 20, 2006 5:25 PM To: Wallace Keith Cc: Arnold Nipper Subject: Re: TDS - AS On 20.03.2006 23:16

Re: DNS Amplification Attacks

2006-03-20 Thread Todd Vierling
On Mon, 20 Mar 2006, Peter Dambier wrote: How about alternative roots? ICANN does censor XN--55QX5D., XN--FIQS8S. and XN--IO0A7I. already. You must use alternative roots to exchange emails with people living in those domains. Stop with the bull$**+ (self-censored), trying to recast the

Re: TDS - AS

2006-03-20 Thread Pete Templin
Arnold Nipper wrote: gw001#sh ip bg 64.35.192.0 BGP routing table entry for 64.0.0.0/4, version 247378 Should we really be seeing 64/4? That's an awfully big aggregate...that I don't see in ARIN as an exact-match. (Paging the filter police...) pt

Re: DNS Amplification Attacks

2006-03-20 Thread Andy Davidson
Joseph S D Yao wrote: [...] service except perhaps to their own population, than against what can you compare the DNS service that you are getting, to see whether it is giving you what the world should be seeing? DNS looking glasses, in much the same way that we use web-form based BGP or