Three vectors were exploited in the recent DDoS attack against Spamhaus: 1) Amplification of DNS queries through the use of DNSSEC signed data 2) Spoofed source addresses due to lack of ingress filtering (BCP-38) on originating networks 3) Utilisation of multiple open DNS resolvers While 1) is unavoidable simply due to the additional data that DNSSEC produces, and 2) “should” be practised as part
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く