North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: DOS attack against DNS?
- From: Alon Tirosh
- Date: Tue Jan 17 00:13:42 2006
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=flJ6PgCGAEwTmfcjLjo78HcXgQitQ/vxsmo29O68hImNIGIUiMRYJfPc7O13NMjahR27k+Xirtufo9aDIm6dU9J7FntoSwP7NrR+bvsgGXikU6HHqpipFsiyuKXBkwXR+ZjMjCws+vGRst+FGFE68LNzDFKV2Or5xILYUdzk+GQ=
Not true,. the ANY query has mutliple uses for consolidating multiple diagnostic queries into a single display, and also for diversion monitoring systems on small domains or groups of same. Not all of us have the resources (or time) of large ISPs behind us.
On 15 Jan 2006 17:27:40 +0000, Paul Vixie <email@example.com> wrote:
> client xx.xx.xx.xx#6704: query: z.tn.co.za ANY ANY +E
class "ANY" has no purpose in the real world, not even for debugging. if
you see it in a query, you can assume malicious intent. if you hear it in
a query, you can safely ignore that query, or at best, map it to class "IN".