DNS keyserver (was Re: gnupg-1.0.7: keyserver subdir?)

Michael Graff explorer@flame.org
Wed Jul 10 19:33:02 2002


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Simon Josefsson <jas@extundo.com> writes:

> Is the packet size really the important factor?  I thought a good DDOS
> attack used a protocol that generated several packets given only one.
> Like broadcast ping.
> 
> Also, is it possible to spoof an EDNS.0 session?  I don't remember the
> details, but it may include some kind of cookie, like TCP, which you
> need to guess in order to continue.

Well, a 64k UDP packet will be chopped up into more than 40 packets.

> Or switch to TCP.

If you're going to do that, why use DNS?

- --Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (NetBSD)
Comment: See http://www.flame.org/~explorer/pgp for my keys

iD8DBQE9LG/il6Nz7kJWYWYRAmYyAJ9p883ZxmBzYmxhnFdHLxXeCbLw8QCfepwo
SajmTChbvfJQjBI1Ws7+v1M=
=/ZSH
-----END PGP SIGNATURE-----