Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Set up correct secondary DNS servers (Score 1) 327

Secondary DNS would not have helped here. The issue with DNS is that it's a centralizing service.

I understand that you have a particular drum to beat in this regard, but the problem is actually that Dyn hosted both the primaries and the secondaries, and they took Dyn offline.

If the primaries were at Dyn, and the secondaries were not at Dyn, none of the sites would have experienced any downtime.

Comment Re:Set up correct secondary DNS servers (Score 1) 327

So my IoT thing sends out a http request on port 80 of your web server, is that a DDOS attack or is that a valid request?

In my personal opinion?

It's always an attack, since IoT devices should connect to an Intranet server under your control, and not be vended routable addresses under any circumstances.

Comment Re: Set up correct secondary DNS servers (Score 1) 327

If your TTL is high enough, attacking a DNS service wouldn't deny service. The RFC says at least 1800s. Most of these sites have such poor uptime/architecture that their TTL is set to 120 or less.

Most caching servers at ISPs are set up in violation of the RFCs anyway:

* If they do not have an IPv6 upstream, they fail to filter IPv6 addresses out of their responses to downstream DNS requests.

* If they get some TTL value with less than their idea of a "minimum", they modify the TTL to be 300 or more seconds.

The first makes it hard to be "IPv6 by default", i.e. listing the IPv6 responses first in preference order over the IPv4, since it makes it not work for some people on the downstream side (the IPv6 addresses have to each time out before an IPv4 address, if there is one, is attempted).

The second makes it a real time consuming thing to do to have to wait 5 minutes between testing DNS reconfigurations to see if they work (and then you get 5 minutes of downtime when they don't, before you can fix them).

Comment Incorrect. 10,000 DNS servers in the pool... (Score 1) 327

But I will. If you spit it up into two sections, then the attacker will simply attack both servers. How many secondary servers would you need before the attack is spread too thin to deny service? Who knows.

That's easy. You put ALL of them in the peering pool. If you don't put your servers in the peering pool, then an attack can take you down... but no one else. Good luck getting customers in the future.

It's very easy: 10,000 DNS servers means a 1:10,000 chance of them hitting both your primary and secondary servers for your domain. Unless it's YOU the bad guys are attacking, instead of the DNS infrastructure (and if it's YOU, you have other problems), then it's unlikely that both your primary and secondary will get hit.

But don't forget that the companies are paying for all this bandwidth.

Yes. And to make it fair, you scale your presence in the pool by the number of domains you are personally hosting. If you host 1,000 domains, then at most you will also be secondary for 1,000 domains. If you host 1,000,000 domains, then you will host at most 1,000,000 secondaries.

This is why it's a peering pool.

Even if their services stay online they're spending $$$ to keep them online while the attacker isn't spending any money.

One company is an acceptable casualty. It's likely, however, that the Bad Guys(tm) were either targeting a number of specific domains, or they were targeting Dyn itself.

Either way, you'd set up collective defense resources for all pool members (that way, even if they were just going after Dyn, you could still afford to go after the culprit).

Comment This (Score 1) 449

Women already make up nearly 60% of all college graduates. They already receive favoritism for things like financial aid, grants, and scholarships (except for sports). There are TV ads, commercials, and companies doing everything they can to get more women into STEM and it is all failing. So what, coercion and extortion are not working so we panic?

People should stop trying to bully people into a field and forcing an ideology that people simply don't want. There is equal opportunity, in fact it's white males who today are treated like shit by politicians, academics, and media and every other racial group and gender is receiving preferences.

Also, people in general need to stop pretending like biological differences don't matter. They do, and facts matter.

Comment Blame the ISPs (but especially Dyn) (Score 1) 174

Properly configured DNS secondaries hosted at different ISPs would have completely mitigated the problem for everyone but Dyn. Because Dyn hosts its own secondaries, hitting Dyn downed both primary and secondary servers.

ISPs need a peering pool arrangement for DNS secondaries, where secondaries are distributed over the entire pool.

This is how it was designed to work: multiply connected redundant secondaries.

The worst damage possible in that scenario is the inability to update DNS information hosted at Dyn itself, or to initiate zone transfers in or out of Dyn.

That reduces it from an attack on the DNS infrastructure to an attack on Dyn itself (which is much less important to everyone but Dyn).

Comment Set up correct secondary DNS servers (Score 5, Interesting) 327

Set up correct secondary DNS servers.

If the secondaries had not been hosted at the same company, but instead at various companies around the world, the attack would have had no effect on anything but traffic.

This is, by the way, how multiply connected networks are supposed to work.

This could be easily accomplished at no additional cost by having a peering-pool arrangement between all the host registrars, so that we ended up with a multiply connected redundant network.

Kind of how we designed the thing to work in the 1960's and 1970's, and DNS itself in the 1980's.

But a lot harder for law enforcement to issue DNS-based takedowns on, of course. Since it would route around the damage and keep functioning. As designed.

Comment Re:It was a premises warrant. (Score 1) 421

He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe —- by word or deed

Meaning the fingerprint gathering for the use of opening the phone is tantamount to compelled testimony in the general case, while the fingerprint gathering for the use of identification and matching is not.

Keys don't change. Fingerprints don't change. A biometric identifier is therefore not affirmative.

Combinations can change. Pin codes can change. Utilizing either requires active participation in a process. And is therefore affirmative.

Fingerprint usage is therefore tantamount to using a key, and if you are stupid enough to use a biometric identifier as an access method, you've picked a non-affirmative access method.

Slashdot Top Deals

An inclined plane is a slope up. -- Willard Espy, "An Almanac of Words at Play"