The document discusses DNS DDoS attacks and possible mitigations. It notes that the October 2016 DDoS attack against DNS provider DYN used compromised IoT devices to launch queries against authoritative name servers, exhausting their resources. Potential mitigations discussed include increasing server capacity, longer TTLs to reduce query frequency, filtering queries by name or IP, and leveraging DNSSEC with NSEC aggressive caching to have recursive resolvers directly answer NXDOMAIN queries rather than referring them to authoritative servers. However, the document argues that piecemeal solutions will not prevent future attacks and a more resilient DNS infrastructure is needed through open discussion and cooperation across stakeholders.
Related topics: