All,

I am (we all are (?)) interested in techniques for mitigating DNS amplification 
attacks for both recursive and authoritative BIND servers (versions 9.x).


Google found http://www.secureworks.com/research/threats/dns-amplification/ and 
http://www.publicsafety.gc.ca/prg/em/ccirc/2009/av09-011-eng.aspx
which mention limiting clients via ACLs and using "additional-from-cache no;" 
as mitigation techniques.


Good articles, but written several years ago so there might be additional 
configuration suggestions from the community since 2009.
Are there and, if so, what are they?
Perhaps said another way, what other named.conf settings could we be looking at 
in this effort?


Thank you.

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to