Bind vs flood

Peter Andreev andreev.peter at gmail.com
Fri Feb 28 09:36:06 UTC 2014


Well, at first glance it looks like malicious activity, so the best action
is to call all users, suspected in sending such requests, and warn them.
The fast and very (very-very-very) dirty solution is to set up zone
84822258.com <http://niqcs.www.84822258.com> on your resolver. This should
supress outgoing queries and thus minimize resolving time.


2014-02-28 12:06 GMT+04:00 Dmitry Rybin <kirgudu at corbina.net>:

> On 27.02.2014 09:59, Dmitry Rybin wrote:
>
>  Bind answers with "Server failure". On high load (4 qps) all normal
>> client can get Servfail on good query. Or query can execute more 2-3
>> second.
>>
>
> I have an a mistake, 4'000 QPS.
>
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> unsubscribe from this list
>
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>



-- 
Is there any problem Exterminatus cannot solve? I have not found one yet.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20140228/46e31807/attachment.html>


More information about the bind-users mailing list