Spamhaus attacks expose huge open DNS server dangers

Warnings of security problems posed by poorly configured DNS servers go mostly unheeded for years

By , Computerworld |  Security

DNS server operators also need to have egress filtering controls in place to ensure that the DNS traffic leaving their networks originated from inside their network, he said.

The Open DNS Resolver Project also calls on DNS server operators to consider implementing rate limiting software to prevent the sort of traffic amplification that was used in the Spamhaus attacks.

"There are things that need to get cleaned up. That is why we need some awareness of the problem," Smith said.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Originally published on Computerworld |  Click here to read the original story.
Join us:






Answers - Powered by ITworld

Ask a Question