Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: DOS attack against DNS?

  • From: Alon Tirosh
  • Date: Tue Jan 17 00:13:42 2006
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=flJ6PgCGAEwTmfcjLjo78HcXgQitQ/vxsmo29O68hImNIGIUiMRYJfPc7O13NMjahR27k+Xirtufo9aDIm6dU9J7FntoSwP7NrR+bvsgGXikU6HHqpipFsiyuKXBkwXR+ZjMjCws+vGRst+FGFE68LNzDFKV2Or5xILYUdzk+GQ=

Not true,. the ANY query has mutliple uses for consolidating multiple diagnostic queries into a single display, and also for diversion monitoring systems on small domains or groups of same. Not all of us have the resources (or time) of large ISPs behind us.

On 15 Jan 2006 17:27:40 +0000, Paul Vixie <vixie@vix.com> wrote:

> client xx.xx.xx.xx#6704: query: z.tn.co.za ANY ANY +E

class "ANY" has no purpose in the real world, not even for debugging.  if
you see it in a query, you can assume malicious intent.  if you hear it in
a query, you can safely ignore that query, or at best, map it to class "IN".
--
Paul Vixie




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.