mailing list archives
Re: DNS Attacks
From: Joel M Snyder <Joel.Snyder () Opus1 COM>
Date: Sat, 18 Feb 2012 14:41:39 -0700
Quoting the FBI:
220.127.116.11 through 18.104.22.168
22.214.171.124 through 126.96.36.199
188.8.131.52 through 184.108.40.206
220.127.116.11 through 18.104.22.168
22.214.171.124 through 126.96.36.199
188.8.131.52 through 184.108.40.206
Solve said problem easily by destination NATing those IPs on 53/UDP/TCP
to your own recursive servers, or dump them on Google at 220.127.116.11 if
you're so inclined. Extra bonus result: NAT logs will show who needs a
pleasant email from customer service.
Or you could just let 'em suffer, BoFH-style.
 "'em" in this case is "your customer service reps" who will see a
'higher than normal call volume' should the FBI's warning mean anything.
Joel M Snyder, 1404 East Lind Road, Tucson, AZ, 85719
Senior Partner, Opus One Phone: +1 520 324 0494
jms () Opus1 COM http://www.opus1.com/jms