Keith Mitchell <[email protected]> wrote:
>
> This only works for recursive resolvers - for authoritative nameservers,
> the traffic profiles are such that it's very difficult to
> distinguish between legitimate and attack traffic.

That isn't true at the moment. There are a number of quite crude but
effective remedies against current amplification attacks, and response
rate limiting should be effective against many future attacks too.

> > It's slightly easier to trace this if it's your nameserver that's
> > being used as one of the relay/reflectors rather than if you're the
> > target since you're closer to the true source of the fake queries.
>
> I know a number of large authoritative TLD operators who've been working
> on this for some months now, and have yet to report any results. If you
> know anyone or anything that can do better, I'd love to hear from them.

Our experience (cam.ac.uk) of trying to trace back the source of attacks
has been very discouraging :-(

Tony.
-- 
f.anthony.n.finch  <[email protected]>  http://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.

Reply via email to