Re: What to improve? BCP-38/SAC-004 anyone?

"Patrik Fältström " <paf@frobbit.se> Fri, 01 January 2016 09:48 UTC

Return-Path: <paf@frobbit.se>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FEB81A8769 for <ietf@ietfa.amsl.com>; Fri, 1 Jan 2016 01:48:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.961
X-Spam-Level:
X-Spam-Status: No, score=-1.961 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_SE=0.35, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mO9sHOVqlppA for <ietf@ietfa.amsl.com>; Fri, 1 Jan 2016 01:48:42 -0800 (PST)
Received: from mail.frobbit.se (mail.frobbit.se [85.30.129.185]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1FB71A8752 for <ietf@ietf.org>; Fri, 1 Jan 2016 01:48:42 -0800 (PST)
Received: from [192.168.1.118] (frobbit.cust.teleservice.net [85.30.128.225]) by mail.frobbit.se (Postfix) with ESMTPSA id 6D6E11FDB4; Fri, 1 Jan 2016 10:48:40 +0100 (CET)
From: Patrik Fältström <paf@frobbit.se>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Subject: Re: What to improve? BCP-38/SAC-004 anyone?
Date: Fri, 01 Jan 2016 10:48:39 +0100
Message-ID: <B545DA07-2BD5-467D-A476-D26AD8E33A12@frobbit.se>
In-Reply-To: <28253.1451605858@obiwan.sandelman.ca>
References: <7664F94E-F7A6-4556-B1E6-2DE536A7B7FC@frobbit.se> <5684FCDB.7010009@mnt.se> <A074CA07-691E-41A7-B1D7-33F4ECBED5A9@puck.nether.net> <568579FB.6030702@gmail.com> <DE81772E-22BA-45CE-A1B8-9E1BB34C0460@puck.nether.net> <28253.1451605858@obiwan.sandelman.ca>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=_MailMate_03A8D4E8-00D9-4186-A026-54F0A49A13E9_="; micalg="pgp-sha1"; protocol="application/pgp-signature"
X-Mailer: MailMate (1.9.3r5187)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/0q0-bXPCmJEABiblwd4Wl9ShcaI>
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Jan 2016 09:48:44 -0000

On 1 Jan 2016, at 0:50, Michael Richardson wrote:

> (The last one, which seems to have been the largest to date, it is unclear to
> me if it was with forged source address)
>
> http://www.root-servers.org/news/events-of-20151130.txt

For one root server operator view (Verisign) see this post:

<http://www.circleid.com/posts/20151215_verisign_perspective_on_recent_root_server_attacks/>

  Patrik Fältström
  Root server operator...and NTP operator...and IX operator...