Hello,

an update with the findings so far:

- IPv6 config on the servers was an issue so we removed it and will test
  further later. There is a hint pointed from various people about a
  Linux kernel issue and setting (net.ipv6.route.max_size), see

  https://lists.dns-oarc.net/pipermail/dns-operations/2014-February/011366.html

- our main issue was that we were being attacked. Open resolvers in our
  network were utilized to produce large amounts of queries with random
  subdomains of specific domains. Analyzing a small capture we noticed
  the following domains, but the list should not be considered complete
  I guess

  www.jxoyjt.com.cn
  liebiao.81ypf.com
  yuerengu.com.cn
  www.lgsf.net
  www.xxcfsb.com
  lie.zz85.com
  www.9009pk.com
  www.bcbang.com
 
One mitigation approach is to blackhole the domains using local zones.
  
-- 
Kostas Zorbadelos               
twitter:@kzorbadelos            http://gr.linkedin.com/in/kzorba 
----------------------------------------------------------------------------
()  www.asciiribbon.org - against HTML e-mail & proprietary attachments
/\  
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to