[nsp-sec] DNS DDoS uptick

Chris Morrow morrowc at ops-netman.net
Tue Apr 7 14:50:57 EDT 2009



On Tue, 7 Apr 2009, Florian Weimer wrote:

> ----------- nsp-security Confidential --------
>
> My personal opinion (and you probably won't like it) is that this
> issue, even in a much escalated variant, can be dealt with by several
> steps:

(not disagreeing with you, just a question or 2)

>
>  - a widely replicated root of a limited size (replication must
>    remain feasible)

as in . not sun.com. right? (though pushing out sun.com. to many anycasted 
or 'local' places has its merits as well, I think. and associated 
tradeoffs with management of course.)

>
>  - use of per-country or regional TLDs for most services, with
>    dedicated name service (so that attacks on the TLD name service
>    can be mitigated locally, and non-local traffic can be filtered
>    graciously)

This seemed like a great idea 'back in the day' but everyone essentially 
bought .com domains :( and I don't see the ccTLD folks hosting in-country 
(for all but the larger countries at least) I hope that the ccTLD op has 
in their contract that they must run a copy 'local' to the cc, but...

>
>  - important services must have backup name service on the same
>    network(s), not just centralized, external DNS service

can you define this a little better? I think it's important to have DNS 
servers in more than one location (network and geography) but is that what 
you meant here? or 'all of sun.com's nameservers should be in sun's 
network'?? Clearly pointing all of your DNS servers into register.com was 
a 'bad plan' last week :( but if you are the attackee you'd have just 
brought the pain to register.com & 'otherprovider' :(

>
> Some of the services/setups I use regularly aren't too far away from
> that.

clarify?

-Chris
(is this a set of things that should end up in a more public and 
accessible format? not rfc2182, which for whatever reason people aren't 
reading/heeding)



More information about the nsp-security mailing list