nanog mailing list archives
Re: Mitigating DNS amplification attacks
From: "Dobbins, Roland" <rdobbins () arbor net>
Date: Wed, 1 May 2013 00:45:25 +0000
On May 1, 2013, at 7:42 AM, Thomas St-Pierre wrote:
As for BCP38, I would love to stop the spoofed packets, however with them coming from our upstreams, (Level3, Cogent, Tata, etc) I don't see how we can.
Contact them on a case-by-case basis to report the spoofed traffic used to stimulate the servers into responding, including the layer-4 classification criteria, traffic rates, and timestamps available via flow telemetry. ----------------------------------------------------------------------- Roland Dobbins <rdobbins () arbor net> // <http://www.arbornetworks.com> Luck is the residue of opportunity and design. -- John Milton
Current thread:
- Re: Mitigating DNS amplification attacks Dobbins, Roland (Apr 30)
- Re: Mitigating DNS amplification attacks Thomas St-Pierre (Apr 30)
- Re: Mitigating DNS amplification attacks Damian Menscher (Apr 30)
- Re: Mitigating DNS amplification attacks Thomas St-Pierre (Apr 30)
- Re: Mitigating DNS amplification attacks Dobbins, Roland (Apr 30)
- Re: Mitigating DNS amplification attacks Damian Menscher (Apr 30)
- Re: Mitigating DNS amplification attacks Doug Barton (May 01)
- Re: Mitigating DNS amplification attacks Thomas St-Pierre (Apr 30)
- <Possible follow-ups>
- Re: Mitigating DNS amplification attacks Jared Mauch (Apr 30)
- Re: Mitigating DNS amplification attacks Jeff Wheeler (May 01)
- Re: Mitigating DNS amplification attacks Dobbins, Roland (May 01)
- Re: Mitigating DNS amplification attacks Alain Hebert (May 01)
- Re: Mitigating DNS amplification attacks Jeff Wheeler (May 01)