Gentoo Archives: gentoo-user

From: Michael Mol <mikemol@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] How to prevent a dns amplification attack
Date: Thu, 28 Mar 2013 21:04:46
Message-Id: 5154B059.9010205@gmail.com
In Reply to: Re: [gentoo-user] How to prevent a dns amplification attack by Kevin Chadwick
1 On 03/28/2013 04:57 PM, Kevin Chadwick wrote:
2 >
3 >> listened to the dangers and even now simply redesigned DNSSEC.
4 >
5 > Or they could fudge it by making every request requiring padding larger
6 > than the response. Bandwidth would increase astronomically but amp
7 > attacks would have to find other avenues.
8 >
9
10 Infeasible; the requester cannot know the size of the response in
11 advance. If a packet comes in, and the response is larger than the
12 request, is it really an amp packet, did the client not know, or is the
13 server misconfigured and not limiting the response data as much as it could?

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies

Subject Author
Re: [gentoo-user] How to prevent a dns amplification attack Kevin Chadwick <ma1l1ists@××××××××.uk>