mailing list archives
Re: DNS Attacks
From: Joel M Snyder <Joel.Snyder () Opus1 COM>
Date: Sat, 18 Feb 2012 14:41:39 -0700
Quoting the FBI:
126.96.36.199 through 188.8.131.52
184.108.40.206 through 220.127.116.11
18.104.22.168 through 22.214.171.124
126.96.36.199 through 188.8.131.52
184.108.40.206 through 220.127.116.11
18.104.22.168 through 22.214.171.124
Solve said problem easily by destination NATing those IPs on 53/UDP/TCP
to your own recursive servers, or dump them on Google at 126.96.36.199 if
you're so inclined. Extra bonus result: NAT logs will show who needs a
pleasant email from customer service.
Or you could just let 'em suffer, BoFH-style.
 "'em" in this case is "your customer service reps" who will see a
'higher than normal call volume' should the FBI's warning mean anything.
Joel M Snyder, 1404 East Lind Road, Tucson, AZ, 85719
Senior Partner, Opus One Phone: +1 520 324 0494
jms () Opus1 COM http://www.opus1.com/jms