Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: DDos syn attack

  • From: Sean Donelan
  • Date: Wed Jan 01 23:51:59 2003

On Wed, 1 Jan 2003, Avleen Vig wrote:
> Tracing back an IP from bind logs to see which name servers looked up an
> attacked address immediately before the attack started. This at leads to
> the offender's ISP which is a good start.

Relatively few people restrict the use of their name servers to only
local users.  More folks have been getting DNS servers from DHCP/Radius,
but there are still a lot of users with hard-coded resolvers.  There may
be a few DNS resolvers which keep track of query sources, but more than
likely you'll end up at another dead-end because the true source will be
somewhere else.

Let's add port 53 to the every growing list of ports to block.






Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.