[ratelimits] rrl mention in an nlnetlabs tech report

Yasuhiro Orange Morishita / 森下泰宏 yasuhiro at jprs.co.jp
Mon Aug 26 08:06:08 UTC 2013


Hello, Matthijs-san,

> The presentation on the RRL report is here:
>     http://rp.delaat.net/2012-2013/p29/presentation.pdf

Thank you for your pointed out.  I will read it.

BTW, I've read your presentation already.
<http://www.guug.de/veranstaltungen/ffg2013/talks/DNS_Rate_Limiting__Matthijs_Mekking.pdf>

I think it's one of the best presentation for describing and
understanding RRL.

We have cited your presentation as [MEKKING2013] on our technical
document about DNS reflector attacks and RRL (it's written in Japanese).
<http://jprs.jp/tech/notice/2013-04-18-reflector-attacks.html>

Thanks and regards,

-- Orange

From: Matthijs Mekking <matthijs at nlnetlabs.nl>
Date: Mon, 26 Aug 2013 09:52:14 +0200

> Hi,
> 
> On 08/23/2013 10:13 AM, Yasuhiro Orange Morishita wrote:
> > Hello,
> > 
> > I've found a presentation slides made by the author.  Thanks for google.
> > <http://rp.delaat.net/2012-2013/p92/presentation.pdf>
> 
> This presentation is not about the RRL measurements. This is a small
> research done by on of our other interns, and is about using Visual
> Analytics to discover DNS abuse.
> 
> The presentation on the RRL report is here:
> 
>     http://rp.delaat.net/2012-2013/p29/presentation.pdf
> 
> > 
> >> Made by one of our interns.
> > 
> > Your intern is great.
> 
> To be precise, the research was done by two interns.
> 
> Best regards,
>   Matthijs
> 
> > 
> > -- Orange
> > 
> >> --Olaf
> >>
> >> PS. other related intern work: http://www.nlnetlabs.nl/downloads/publications/report-rrl-dekoning-rozekrans.pdf
> >>
> > 
> > From: Olaf Kolkman <olaf at NLnetLabs.nl>
> > Date: Fri, 23 Aug 2013 10:01:24 +0200
> >>
> >>
> >>
> >>
> >> On 22 aug. 2013, at 20:02, Paul Vixie <paul at redbarn.org> wrote:
> >>
> >>> saw this:
> >>>
> >>>> Another pro-active technique is Response Rate
> >>>> Limiting (RRL) [29]. It limits the number of unique
> >>>> responses sent by the authoritative server. Roughly,
> >>>> it works by keeping track of of several pieces of
> >>>> information of the responses. With every subsequent
> >>>> request, the name server checks whether the
> >>>> response that would be sent exceeds the set limit
> >>>> of responses per second per set of information. If
> >>>> this is the case, it either responds only once in a
> >>>> number of queries (configurable) or it sends a
> >>>> truncated (TC-flag set) answer, forcing a legitimate
> >>>> resolver to retry the query over TCP. RRL is currently
> >>>> the most promising technique and is implemented
> >>>> in the most popular name server software like
> >>>> BIND [14], NSD [20] and Knot [17]. The effectiveness
> >>>> of RRL is debated, it stops unsophisticated
> >>>> attacks using reflection. 
> >>>
> >>> here:
> >>>
> >>> http://www.nlnetlabs.nl/downloads/publications/report-rp2-lexis.pdf
> >>
> >>
> >> Made by one of our interns.
> >>
> >> I wonder if you wanted to express something more than "look at this" with the specific quote?
> >>
> >> --Olaf
> >>
> >> PS. other related intern work: http://www.nlnetlabs.nl/downloads/publications/report-rrl-dekoning-rozekrans.pdf
> >>
> >>
> > _______________________________________________
> > ratelimits mailing list
> > ratelimits at lists.redbarn.org
> > http://lists.redbarn.org/mailman/listinfo/ratelimits
> > 
> 


More information about the ratelimits mailing list