Attack on DNS root servers

  • I suspect that this might have been a botnet showing off to its potential clients. This may explain withholding of the domain names queried (not to give advertising to the botnet).

  • "Source Address Validation and BCP-38." ISPs should validate the source address of UDP traffic from their end customers. This would end most UDP based volumetric DDoS attacks.

  • The beauty of DNS: No one was affected or noticed the problem. Resolvers just tried another one if they didnt get a response from one of the root servers.

  • So what were the domain names queried?

  • related ?

    Day 2: UK research network Janet still being slapped by DDoS attack DNS services appear to be targeted, switching may work

    http://www.theregister.co.uk/2015/12/08/uk_research_network_...

  • What made this unique now? Was it simply a high load?

  • Why is root-servers.org not https?

  • Is there significance to NTP requests in relationship to DDOS?

  • They don't mention otherwise but do we know if the attack has happened again since 1 December?

  • China testing something new? Or maybe some scriptkiddie testing their new botnet?

  • Donald Trump's failed attempt to shut down the Internet.

  • I bet the observed "random" source addresses are open recursive DNS servers. For this kind of attack they provide essentially free traffic-washing for whatever actual traffic-generation mechanism the attackers have.

  • what was the query string?

  • Rooftops?