denied NS/IN

Mark Andrews Mark_Andrews at isc.org
Wed Jan 21 02:35:50 UTC 2009


In message <FB979B33-DF83-4460-A3E4-040CD165E8B9 at newgeo.com>, Scott Haneda writ
es:
> On Jan 20, 2009, at 5:44 PM, Mark Andrews wrote:
> 
> > In message <232B45F8-ACD3-427A-95E9-BC3CA5FC9499 at newgeo.com>, Scott  
> > Haneda writ
> > es:
> >> Hello, looking at my logs today, I am getting hammered with these:
> >> 20-Jan-2009 15:39:06.284 security: info: client 66.230.160.1#48517:
> >> query (cache) './NS/IN' denied
> >> 20-Jan-2009 15:39:06.790 security: info: client 66.230.128.15#31593:
> >> query (cache) './NS/IN' denied
> >>
> >> Repeated over and over, how do I tell what they are, and if they are
> >> bad, what is the best way to block them?
> >> --
> >> Scott
> >
> > 	You should talk to your ISP to chase the traffic back to
> > 	its source and get BCP 38 implemented there.  BCP 38 is ~10
> > 	years old now.  There is no excuse for not filtering spoofed
> > 	traffic.
> >
> > 	If the source doesn't want to implement BCP 38 then de-peering
> > 	the source should be considered.
> 
> 
> Is BCP 38 really as solid and plug and play as it sounds?  In a  
> shared, or colo'd environment, can that ISP really deploy something  
> like this, without it causing trouble for those that assume unfettered  
> inbound and outbound traffic to their servers?

	Yes it is.  Everyone in a colo should be able to tell you which
	source address (prefixes) they should be emitting.  You filter
	everything else.

	The closer to the edge that you do this the easier it is to do.

	Mark

> --
> Scott
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews at isc.org



More information about the bind-users mailing list