Re: AW: Odd policy question.

2006-01-14 Thread Florian Weimer
* Jeffrey I. Schiller: Let me attempt to bring this back to the policy question. Does someone have the *right* to put one of your IP addresses as an NS record for their domain even if you do not agree? I don't think it's allowed (and it shouldn't be), but without a cluestick from legal, you

Re: AW: Odd policy question.

2006-01-14 Thread Florian Weimer
* Randy Bush: it is a best practice to separate authoritative and recursive servers. why? e.g. a small isp has a hundred auth zones (secondaried far away and off-net, of course) and runs cache. why should they separate auth from cache? Some registrars require that you begin to serve the

Re: Is my router owned? How would I know?

2006-01-14 Thread Alexei Roudnev
I use CCR (Cisco COnfiguration Repository, part of snmpstat project) and have change reports daily, + have syslog reports hourly. The same (osiris ) with hosts, btw. - Original Message - From: Rob Thomas [EMAIL PROTECTED] To: NANOG nanog@merit.edu Sent: Thursday, January 12, 2006 10:19

Re: Is my router owned? How would I know?

2006-01-14 Thread Alexei Roudnev
http://snmpstat.sourceforge.net/CCR-config.htm - Original Message - From: Randy Bush [EMAIL PROTECTED] To: Jared Mauch [EMAIL PROTECTED] Cc: NANOG nanog@merit.edu Sent: Thursday, January 12, 2006 1:00 PM Subject: Re: Is my router owned? How would I know? Configuration Change

Re: Is my router owned? How would I know?

2006-01-14 Thread Alexei Roudnev
Some Cisco IOS'es have numerous bugs, related to SNMP (I watched few cases, when all Cisco's 72xx lost configuration becuase of receivbing something bogus), so SNMP should be filtered out from public internet. - Original Message - From: Mikael Abrahamsson [EMAIL PROTECTED] To: NANOG

Re: Is my router owned? How would I know?

2006-01-14 Thread Mikael Abrahamsson
On Sat, 14 Jan 2006, Alexei Roudnev wrote: Some Cisco IOS'es have numerous bugs, related to SNMP (I watched few cases, when all Cisco's 72xx lost configuration becuase of receivbing something bogus), so SNMP should be filtered out from public internet. The major problem people forget is that

Re: AW: Odd policy question. (verification please)

2006-01-14 Thread Todd Vierling
On Sat, 14 Jan 2006, Martin Hannigan wrote: I am taking a proactive approach to screening my emails so that I don't get junk mail. Please just click on the link below so I can get your message, and all your future messages. You only have to do this ONCE! Kurt, and our friends at

Re: Worm?

2006-01-14 Thread Rubens Kuhl Jr.
See story below from isc.sans.org (now on cover page, article on http://isc.sans.org/diary.php?storyid=1042) Rubens --- TippingPoint IPS DoS (High CPU load) (NEW) Published: 2006-01-14, Last Updated: 2006-01-14 05:57:28 UTC by Swa Frantzen

Re: AW: Odd policy question.

2006-01-14 Thread Jeffrey I. Schiller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Joe Abley wrote: That's a little over-broad considering the number of registries there are (and have been, for a long time). I think it's fair to say that even if this was once the case for COM/NET/ORG registries, there are many more

Re: AW: Odd policy question.

2006-01-14 Thread Randy Bush
As an engineer, I believe we would need a protocol that would permit someone to query an IP address to ask what DNS domains it may be an NS for. this addresses neither the issue of longevity nor that of whether it is authoritative for a particular domain which is proposed to be, or has been,

Re: AW: Odd policy question.

2006-01-14 Thread Jeffrey I. Schiller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foolish me. Indeed all that is required is a way to detect that the delegation is lame (hopefully in a secure fashion) and remove the lame delegations. Of course that does leave the problem of what to do if all of the delegations are lame, as Randy

Re: AW: Odd policy question.

2006-01-14 Thread Randy Bush
Indeed all that is required is a way to detect that the delegation is lame for bind vic^H^H^Husers dig +norec zone.name. @delegatee.name. soa to check the ns rrset at the [proposed] delegatee dig +norec zone.name. @delegatee.name. ns on later digs, you can also use the +short

Re: AW: Odd policy question.

2006-01-14 Thread Jeffrey I. Schiller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Randy Bush wrote: could you amplify? If registrars regularly checked for lame delegations (or checked on demand). Then a way to attack a domain would be to forge DNS responses to cause the registrar to remove the domain because it is lame. So

Re: AW: Odd policy question.

2006-01-14 Thread Joseph S D Yao
On Sat, Jan 14, 2006 at 04:44:02PM -0500, Jeffrey I. Schiller wrote: ... As an engineer, I believe we would need a protocol that would permit someone to query an IP address to ask what DNS domains it may be an NS for. A simple client server response protocol. Lack of a response would mean all

Re: AW: Odd policy question.

2006-01-14 Thread Valdis . Kletnieks
On Sat, 14 Jan 2006 17:06:20 EST, Jeffrey I. Schiller said: Foolish me. Indeed all that is required is a way to detect that the delegation is lame (hopefully in a secure fashion) and remove the lame delegations. Of course that does leave the problem of what to do if all of the delegations are

DOS attack against DNS?

2006-01-14 Thread Roy
I just started seeing thousands of DNS queries that look like some sort of DOS attack. One log entry is below with the IP obscured. client xx.xx.xx.xx#6704: query: z.tn.co.za ANY ANY +E When you look at z.tn.co.za you see a huge TXT record. Is anyone else seeing this attack or am I the

Re: DOS attack against DNS?

2006-01-14 Thread Mark Andrews
In article [EMAIL PROTECTED] you write: I just started seeing thousands of DNS queries that look like some sort of DOS attack. One log entry is below with the IP obscured. client xx.xx.xx.xx#6704: query: z.tn.co.za ANY ANY +E When you look at z.tn.co.za you see a huge TXT record. Is anyone