In message <fb979b33-df83-4460-a3e4-040cd165e...@newgeo.com>, Scott Haneda writ
es:
> On Jan 20, 2009, at 5:44 PM, Mark Andrews wrote:
> 
> > In message <232b45f8-acd3-427a-95e9-bc3ca5fc9...@newgeo.com>, Scott  
> > Haneda writ
> > es:
> >> Hello, looking at my logs today, I am getting hammered with these:
> >> 20-Jan-2009 15:39:06.284 security: info: client 66.230.160.1#48517:
> >> query (cache) './NS/IN' denied
> >> 20-Jan-2009 15:39:06.790 security: info: client 66.230.128.15#31593:
> >> query (cache) './NS/IN' denied
> >>
> >> Repeated over and over, how do I tell what they are, and if they are
> >> bad, what is the best way to block them?
> >> --
> >> Scott
> >
> >     You should talk to your ISP to chase the traffic back to
> >     its source and get BCP 38 implemented there.  BCP 38 is ~10
> >     years old now.  There is no excuse for not filtering spoofed
> >     traffic.
> >
> >     If the source doesn't want to implement BCP 38 then de-peering
> >     the source should be considered.
> 
> 
> Is BCP 38 really as solid and plug and play as it sounds?  In a  
> shared, or colo'd environment, can that ISP really deploy something  
> like this, without it causing trouble for those that assume unfettered  
> inbound and outbound traffic to their servers?

        Yes it is.  Everyone in a colo should be able to tell you which
        source address (prefixes) they should be emitting.  You filter
        everything else.

        The closer to the edge that you do this the easier it is to do.

        Mark

> --
> Scott
> 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: mark_andr...@isc.org
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to