Re: [Dots] WGLC for draft-dots-use-cases-19

"Jon Shallow" <> Tue, 06 August 2019 12:20 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 45F64120286 for <>; Tue, 6 Aug 2019 05:20:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id zGGzIVDQ-VtF for <>; Tue, 6 Aug 2019 05:20:54 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 56F6B12032F for <>; Tue, 6 Aug 2019 05:20:54 -0700 (PDT)
Received: from ([] helo=N01332) by with esmtp (Exim 4.92) (envelope-from <>) id 1huySN-0006oS-T7; Tue, 06 Aug 2019 13:20:47 +0100
From: "Jon Shallow" <>
To: "'Konda, Tirumaleswar Reddy'" <>, <>, <>, <>, <>
References: <00b001d54c1f$d57799e0$8066cda0$> <> <787AE7BB302AE849A7480A190F8B9330312FDB17@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <> <787AE7BB302AE849A7480A190F8B9330312FDBC8@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <> <787AE7BB302AE849A7480A190F8B9330312FDC3B@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <> <787AE7BB302AE849A7480A190F8B9330312FDC6C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <>
In-Reply-To: <>
Date: Tue, 6 Aug 2019 13:20:41 +0100
Message-ID: <1dd901d54c51$5ce7e160$16b7a420$>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQK1kisCvDc1RSBNtbNFnLiTKznvrwDa6EB0AZmZlskBifd/wwH4EnhjAjIbFfYBOPoZEgFdLKZBApa9xBgCJlPu9qSxmZ4w
Content-Language: en-gb
Archived-At: <>
Subject: Re: [Dots] WGLC for draft-dots-use-cases-19
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 06 Aug 2019 12:21:03 -0000

I had an interesting one a couple of years back.

Attackers were hitting with a lot of DNS queries, spoofing the victim's IP address.  As there were a lot of unsolicited responses coming from it was deduced that there was a reflective attack in progress against the victim's IP address and was black-listed (fortunately close to the victim's IP address).

Unfortunately the victim IP was relying on for its DNS services and so was effectively taken offline - but slowly - as DNS caches timed out for all the devices behind the corporate gateway (victim's IP).  Things were partially working for some time...

So usage of was being both spoofed and genuine.

Top talkers is a hint and only that - deciding what to do with it needs to be done with care.  DOTS is a mechanism for passing information, requesting action etc. but does not do the ultimate mitigation.