Well,

    I was going more for a public list of ISP that refuse to BCP38 their
networks.

    But that's just me =D

On point: (If your corporation is massive enough)

    Basically:

    . Mirror DST Port 53;
    . Write some software to stats who's spamming the same DST IP with
the same query;
    . Dynamic ACL them;

    then

    . Give a talk to your customers =D
  

-----
Alain Hebert                                aheb...@pubnix.net   
PubNIX Inc.        
50 boul. St-Charles
P.O. Box 26770     Beaconsfield, Quebec     H9W 6G7
Tel: 514-990-5911  http://www.pubnix.net    Fax: 514-990-9443

On 05/01/13 06:42, Jeff Wheeler wrote:
> On Tue, Apr 30, 2013 at 8:35 PM, Jared Mauch <ja...@puck.nether.net> wrote:
>> Please provide advice and insights as well as directing customers to the 
>> openresolverproject.org website. We want to close these down, if you need an 
>> accurate list of IPs in your ASN, please email me and I can give you very 
>> accurate data.
> I think that a public list of open-resolvers is probably overdue, and
> the only way to get them fixed.
>
> It is trivial to scan the entire IPv4 address space for DNS servers
> that do no throttling even without the resources of a malicious
> botnet.
>
> Smurf was only "fixed" because, as there were fewer networks not
> running `no ip directed-broadcast,` the remaining amplification
> sources were flooded with huge amounts of malicious traffic.  The
> public list of smurf amplifiers turned out to be the only way to
> really deal with it.  I predict the same will be true with DNS.
>


Reply via email to