Regardless if the source is spoofed or not, one should log it. 
Especially with this amazon abuse cloud, how can you report abuse, they 
want to have an ip address to be able to investigate if something 
originated from their network.

If you log 0/24 you might as well log no range at all.





Am 30.11.20 um 11:12 schrieb Marc Roos:
> Are newer version of bind still logging like this
> 
> Nov 30 10:10:02 ns0 named[1303]: rate-limit: info: limit  responses to
> 3.9.41.0/24
> Nov 30 10:10:02 ns0 named[1303]: rate-limit: info: limit  responses to
> 35.177.154.0/24
> Nov 30 10:10:02 ns2 named[1241]: rate-limit: info: limit  responses to
> 35.177.154.0/24
> Nov 30 10:10:02 ns2 named[1241]: rate-limit: info: limit  responses to
> 3.9.41.0/24
> 
> I already reported, that it is not to smart to log 3.9.41.0/24, better 

> could be logged 3.9.41.100/24 so you know the offending ip

there is nothing like an "offending ip" in case of dns-amplification 
which is usually what happens in context of RRL

it's the forged destination of the attack you see and nothing else


_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to