From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 1C941138010 for ; Sat, 30 Mar 2013 04:07:53 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 13D2DE09C8; Sat, 30 Mar 2013 04:07:39 +0000 (UTC) Received: from ironport2-out.teksavvy.com (ironport2-out.teksavvy.com [206.248.154.182]) by pigeon.gentoo.org (Postfix) with ESMTP id 853A4E0956 for ; Sat, 30 Mar 2013 04:07:37 +0000 (UTC) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Av4EABK/CFFLd+Uh/2dsb2JhbABEvw4Xc4IfAQU6HDMLIRMSDwUlN4gRwS2NYYJIYQONfogOhX6IcIFegxM X-IPAS-Result: Av4EABK/CFFLd+Uh/2dsb2JhbABEvw4Xc4IfAQU6HDMLIRMSDwUlN4gRwS2NYYJIYQONfogOhX6IcIFegxM X-IronPort-AV: E=Sophos;i="4.84,565,1355115600"; d="scan'208";a="6087387" Received: from 75-119-229-33.dsl.teksavvy.com (HELO waltdnes.org) ([75.119.229.33]) by ironport2-out.teksavvy.com with SMTP; 30 Mar 2013 00:07:31 -0400 Received: by waltdnes.org (sSMTP sendmail emulation); Sat, 30 Mar 2013 00:07:07 -0400 From: "Walter Dnes" Date: Sat, 30 Mar 2013 00:07:07 -0400 To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] How to prevent a dns amplification attack Message-ID: <20130330040707.GA5140@waltdnes.org> References: <51540497.5020008@smash-net.org> <5154A1BE.7010308@gmail.com> <201303290049.23399.peter@humphrey.ukfsn.org> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Archives-Salt: 78ea3bbd-93b7-484b-850c-37d3ed5c2501 X-Archives-Hash: b9031c775b5a70082ea9b72ae1f14b6b On Fri, Mar 29, 2013 at 05:34:41PM -0500, Paul Hartman wrote > > Pretty much every major ISP in the US does DNS-hijacking and other > shenanigans, so there's no avoiding the evilness. The obvious questions is... do they hijack all port-53 queries? Depending on the answer, there are 2 different strategies to follow. -- Walter Dnes I don't run "desktop environments"; I run useful applications