Actually we detected these ripe.net ANY requests by observing an increase in TCP DNS requests due to large DNSSEC responses. IP address does not seem spoofed. It seems these (very few) client wait 10 sec before closing their TCP connection, which increases the platform load. We think it is a malware, but feel free to provide more information on that topic.

BR
Daniel

On 07/24/2012 05:22 PM, Stephane Bortzmeyer wrote:
On Mon, Jul 23, 2012 at 04:49:24PM +0200,
  Stephane Bortzmeyer <bortzme...@nic.fr> wrote
  a message of 15 lines which said:

Buggy. It parses the DNS packet from the end and therefore fails
with EDNS packets (which have the OPT resource record at the end).
After checking, I stand corrected. This is not the original xt_dns
(which is buggy) but a fork which fixes the parsing. Sorry for the
false alarm.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to