Our DNS server occasionally get requests for recursion with forged src
addresses.
Currently our server returns "Standard query response, Refused" since
our named.conf
only allows recursion for our internal machines.  This, of course,
results in the poor
machine whose address was forged receiving spurious traffic.

Some of the Cisco firewalls support DNS inspection and can be
configured to drop
requests which want recursion.  What are the ramifications of enabling
this?

Can bind be configured to do this?  I was thinking about something
like:

view "internal" {
  match-clients { localhost; localnets; };
  ...
}

view "external-recursive" {
  match-clients { any; };
  match-recursive-only yes;
  blackhole { any};
}

view "external" {
  ...
}

-- John
[EMAIL PROTECTED]
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to