Report by Dyn.
I had to read in the WSJ learn that the attack uses source spoofing. Of course it would but I had not thought of that. It is relevant to the fix.
From the WSJ: “Friday’s attack highlighted how the internet, which is designed to insure its own stability by distributing control of the network across millions of computers, can still prove vulnerable to targeted assault.”
‘Designed’ perhaps, but not well enough.
I think that DNS was not conceived for the original ARPA net in order to provide stable and memorable domain names, despite migration of computers you might want to find. The domain name solution was the opposite of distributed, however. An organization was invented to form and administer a global name space starting with top-level domain names.
That certain big domains were selectively struck, which is reported, suggests that the overwhelmed servers were not DNS servers but “name servers” which specialize in the sub-domains of some institution.
Somewhere there is a computer X or a few responsible for knowing the IP addresses for all domain names of this form. Its normal legitimate load is quite lite for infrequently used names like that are infrequently sought by DNS. Frequently used names of this form are cached in local name servers. Suddenly the load on X is many orders of magnitude greater for it is queried for each of these bogus requests. Even if other name serves cached negative responses that would just congest their caches because each request is for a new name. I suppose that the company Dyn operates X, for Amazon, and felt responsible for repelling the attack.