<<< Date Index >>>     <<< Thread Index >>>

Re: Verisign Automated SelfLART



Kristian Koehntopp <kris@xxxxxxxxxxxx> zitierte:

> I think that an interesting interaction involving:
>
> 1) Blaster worm DDoS attack against windows update.
> 2) The default action of Windows 2000 and XP computers
> to automatically append the domain name under "Network
> Identification" or the suffix search list to DNS lookups.
> 3) The number of non-existent domains that exist in the
> above settings.
> 4) The change that Verisign made so that all non-existent
> domains resolve to 64.94.110.11
>
> is the cause of the DDoS attack that Verisign is experiencing.

Nette Theorie, aber falsch. Es gab die ganze Zeit über einen NS-Record
für windowsupdate.com. Das unterdrückt die A-Record-Synthese für den
Wildcard, da sich Verisign zumindest hier an die Standards hält. (Ein
RR von anderem Typ reicht zur Unterdrückung aus, es muß nicht derselbe
sein.)

--
To unsubscribe, e-mail: debate-unsubscribe@xxxxxxxxxxxxxx
For additional commands, e-mail: debate-help@xxxxxxxxxxxxxx