denied NS/IN
Mark Andrews
Mark_Andrews at isc.org
Wed Jan 21 01:44:39 UTC 2009
In message <232B45F8-ACD3-427A-95E9-BC3CA5FC9499 at newgeo.com>, Scott Haneda writ
es:
> Hello, looking at my logs today, I am getting hammered with these:
> 20-Jan-2009 15:39:06.284 security: info: client 66.230.160.1#48517:
> query (cache) './NS/IN' denied
> 20-Jan-2009 15:39:06.790 security: info: client 66.230.128.15#31593:
> query (cache) './NS/IN' denied
>
> Repeated over and over, how do I tell what they are, and if they are
> bad, what is the best way to block them?
> --
> Scott
You should talk to your ISP to chase the traffic back to
its source and get BCP 38 implemented there. BCP 38 is ~10
years old now. There is no excuse for not filtering spoofed
traffic.
If the source doesn't want to implement BCP 38 then de-peering
the source should be considered.
Mark
http://www.ietf.org/rfc/rfc2267.txt January 1998
http://www.ietf.org/rfc/rfc2827.txt May 2000 (BCP 38)
http://www.ietf.org/rfc/rfc3704.txt March 2004 (BCP 84)
> _______________________________________________
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: Mark_Andrews at isc.org
More information about the bind-users
mailing list