BIND 10 #2840: implement a mitigation function against DNS amplifications attacks
BIND 10 Development
do-not-reply at isc.org
Sun Sep 15 11:34:09 UTC 2013
#2840: implement a mitigation function against DNS amplifications attacks
-------------------------------------+-------------------------------------
Reporter: cas | Owner:
Type: enhancement | UnAssigned
Priority: medium | Status:
Component: b10-auth | reviewing
Keywords: | Milestone: Next-
Sensitive: 0 | Sprint-Proposed
Sub-Project: DNS | Resolution:
Estimated Difficulty: 8 | CVSS Scoring:
Total Hours: 0 | Defect Severity: N/A
| Feature Depending on Ticket:
| Add Hours to Ticket: 0
| Internal?: 0
-------------------------------------+-------------------------------------
Changes (by dclink):
* owner: dclink => UnAssigned
* status: assigned => reviewing
Comment:
It is only the first step. What I did is I took rrl jinmei's code from his
branch and merged with actual master code (when this code was made the
surrounding one was quite different so I made few adaptations).
It is only for validating what I did :
- I made it optional (new configure option --enable-auth-rrl)
- A new bench of options related to is available (with or without rrl but
for the latter it is only ignored)
So if it is good I ll be able to go on.
--
Ticket URL: <http://bind10.isc.org/ticket/2840#comment:8>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development
More information about the bind10-tickets
mailing list