Re: The Art of Unspoofing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In some mail from eric.prince@cox.net, sie said:
[...]
> The Resolution Theory 
>  
>     	The idea is simple. Usually, when a denial of service attack is 
> initiated against a target host, it's something like: 
> 	
>       # ./attack target.com
> 
>       In order to send the spoofed packets to target.com, the attackers 
> nameserver has to resolve its domain name to an IP address, and only 
> then can it inject the malicious packets. In theory, the nameservers 
> for target.com will receive packets originating from the true source 
> host of the attack or their nameserver.
[...]

An adjunct to this is that nearly all applications will only ever resolve
a hostname _once_.  So if ./attack will start an attack that lasts for
8 hours (say) but our DNS TTL is only 1 hour, we can change the IP# of
target.com and the attack can be deflected.  How low do you go with a
TTL in DNS so you can react in this manner without pushing too much work
back on to DNS ?  Don't know.  I'm sure this is well know, though ?

Darren

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux