Thanks Fajr.
 
I will handle it further.
 
Regards
Babu

--- On Wed, 11/1/12, Fajar A. Nugraha <w...@fajar.net> wrote:


From: Fajar A. Nugraha <w...@fajar.net>
Subject: Re: huge count of DNS deny hits
To: "babu dheen" <babudh...@yahoo.co.in>
Cc: bind-users@lists.isc.org
Date: Wednesday, 11 January, 2012, 1:59 PM


On Wed, Jan 11, 2012 at 1:27 PM, babu dheen <babudh...@yahoo.co.in> wrote:
>
> Dear Fajar,
>
>  Below logs taken from Internal DNS server running in Microsoft DNS.

Then why did you ask this list instead of contacting MS support?

> I checked with client AV status, everything is fine( system is up to date 
> with DAT from Mcafee AV and no threat found in the complete scan output).
>
> But really no idea.. why it happens..  Client is pointed to use different DNS 
> server but DNS flood query is being sent to another DNS server

AV doesn't catch all threats.

Anyway, from bind's perspective, a dns query asking for bind version
is a valid TXT query. But the query can be used by malware,
vulnerability scanners, or hackers looking for vulnerable bind
versions.

In a way, it's similar to ICMP echo (i.e. ping) packets. It's a valid
packet, but a lot of virus/malware is using it to determine which
neighbour hosts to attack. How do you handle ICMP flood cases? The
same mechanism should be applicable in this case.

-- 
Fajar
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to