BIND 10 #2840: implement a mitigation function against DNS amplifications attacks

BIND 10 Development do-not-reply at isc.org
Sun Sep 15 11:34:09 UTC 2013


#2840: implement a mitigation function against DNS amplifications attacks
-------------------------------------+-------------------------------------
            Reporter:  cas           |                        Owner:
                Type:  enhancement   |  UnAssigned
            Priority:  medium        |                       Status:
           Component:  b10-auth      |  reviewing
            Keywords:                |                    Milestone:  Next-
           Sensitive:  0             |  Sprint-Proposed
         Sub-Project:  DNS           |                   Resolution:
Estimated Difficulty:  8             |                 CVSS Scoring:
         Total Hours:  0             |              Defect Severity:  N/A
                                     |  Feature Depending on Ticket:
                                     |          Add Hours to Ticket:  0
                                     |                    Internal?:  0
-------------------------------------+-------------------------------------
Changes (by dclink):

 * owner:  dclink => UnAssigned
 * status:  assigned => reviewing


Comment:

 It is only the first step. What I did is I took rrl jinmei's code from his
 branch and merged with actual master code (when this code was made the
 surrounding one was quite different so I made few adaptations).
 It is only for validating what I did :
 - I made it optional (new configure option --enable-auth-rrl)
 - A new bench of options related to is available (with or without rrl but
 for the latter it is only ignored)

 So if it is good I ll be able to go on.

-- 
Ticket URL: <http://bind10.isc.org/ticket/2840#comment:8>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development


More information about the bind10-tickets mailing list