Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.protocols.dns.bind > #15982
| From | Reindl Harald <h.reindl@thelounge.net> |
|---|---|
| Newsgroups | comp.protocols.dns.bind |
| Subject | Re: issue of Amplification attack |
| Date | 2020-07-12 08:49 +0200 |
| Organization | the lounge interactive design |
| Message-ID | <mailman.718.1594899666.942.bind-users@lists.isc.org> (permalink) |
| References | <mailman.4466.1594382486.941.bind-users@lists.isc.org> <675429057.121047.1594527824988.JavaMail.open-xchange@webmail.cdac.in> <07f55422-73a3-9c44-9099-3e44fc94c4d9@thelounge.net> |
Am 12.07.20 um 06:23 schrieb ShubhamGoyal:
> Dear sir,
> Thank you for give me answer for my previous
> question, Sir now we are suffer from amplification attack so is there
> any method in bind to stop DNS Amplification attack.
> I am thinking to stop or drop ANY type queries from our DNS Recursive
> resolver , so please tell me how can we drop or stop ANY type queries
> from bind.
there where a recent discussion you missed in the past few days, our
config for years:
options {
.......
minimal-responses yes;
minimal-any yes;
rate-limit
{
responses-per-second 10;
window 5;
};
}
Back to comp.protocols.dns.bind | Previous | Next | Find similar
Re: issue of Amplification attack Reindl Harald <h.reindl@thelounge.net> - 2020-07-12 08:49 +0200
csiph-web