On Tue, 9 Sep 2008, Ron Bonica wrote:

> Bill,
> 
> That why in the next paragraph I said:
> 
> > If you think that you have an alternative plan for mitigating this
> > attack, you might be able to resurrect open resolvers with a new draft
> > that describes this mitigation.
> 
> Also, if Dean feels that the alternative mitigation is so compelling
> that he could muster WG consensus around it, he has until this Friday to
> describe the mitigation on the mailing list.

Mitigation of open resolver attacks is well described, both by BCP38 and 
by the previous comparision with the more damaging DNS attack.

If one is attacked by open recursors, the mitigation during the attack
is to filter the packets from the open recursors during the attack.  
Filtering open recursors usually has little or no damage to either the
recursor operator or the target of the attack. This is the typical
response by ISPs to all kinds of packet flooding attacks. There is
nothing special about open recursor attacks that requires any kind of
special handling.

                --Dean




-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to