FTR RRL will not help on this case. There’s no difference between response with TC and response with REFUSED.
It would make a difference only if there was NOERROR response with data. Ondřej -- Ondřej Surý — ISC (He/Him) My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours. > On 16. 12. 2021, at 14:28, Reindl Harald <h.rei...@thelounge.net> wrote: > > > >> Am 16.12.21 um 14:22 schrieb Andrew P.: >> Sorry about forgetting to post the list. I hit Reply instead of Reply All. >> Annoying inconsistent list servers.... > > blame your mail-client for not support "reply-list" buttons and "reply-all" > is breaking this for me :-) > >> You don't understand what kind of blacklist I want; I want to blacklist the >> domain name being asked for, so I don't answer for it. I'm not looking to >> blacklist forged IP addresses of requestors (since we all know criminals >> don't use their own identities; they use the identities of innocent >> bystanders). >> Again, why should _my_ nameserver_ respond to a query for "./ANY/IN"? I am >> not a rootserver, and never will be. > > > AGAIN: you don't gain anything by not responding on a UDP protocol because > the client can't distinct no response and packet loss > > so you *increase* the load by retries on the client > > don't get me wrong but you need to understand the implications of what you > are doing - for DOS attacks "Response Rate Limiting" was invented and for > non-DOS requests there isn't any valid reason to take action > >> ________________________________________ >> From: bind-users <bind-users-boun...@lists.isc.org> on behalf of Reindl >> Harald <h.rei...@thelounge.net> >> Sent: Thursday, December 16, 2021 8:14 AM >> To: bind-users@lists.isc.org >> Subject: Re: Millions of './ANY/IN' queries denied >>> Am 16.12.21 um 14:04 schrieb Andrew P.: >>> So you're claiming that legitimate resolvers would still be pointing at the >>> wrong IP address for a public DNS server after over 16 years? >> besides that i don't know why you are answering off-list nowhere did i >> say anything about 16 years >> but it can take time >> just because some IP is asking for a domain you don't host is for sure >> not a justification for automated blacklisting - that will happen >> regulary after domain-transfers for some time >>> And asking repeatedly and rapidly for the same illegal root domain name in >>> synchronized bursts of 10 queries supposedly from 10 different IP addresses? >> that's what "Response Rate Limiting" is for >>> I say that because I have held the particular static IPv4 address that my >>> nameserver is running on for that long, and I have never run a root >>> nameserver of any sort, or hosted domains for anyone but myself. >> fine, that's *your* case - we host 800 domains and all the time some get >> transferred to us and some get away >>> I agree with the concept of a blacklist >> i don't because the IP is in most cases FORGED >>> how do I set up one on my copy of bind so I can refuse to answer those >>> obvious DNS DDoS attacks? While still answering legitimate requests for the >>> domains I do hosts, that is. >> "Response Rate Limiting" >> again: the IP you mostly see is FORGED and the victim not the attacker >> and all you do is blacklisting the innocent victim which never did >> anything bad >> with automated blacklisting you expose yourself to a simple DOS attack - >> when i forge 8.8.8.8 and 8.8.4.4 and you do automated blacklisting i >> take your domain offline for anybody on the planet using the google >> resolvers >> and after 8.8.8.8 and 8.8.4.4 i feed you with a list of all known ISP >> resolvers for endusers - game over, you blacklisted the world >>> ________________________________________ >>> From: bind-users <bind-users-boun...@lists.isc.org> on behalf of Reindl >>> Harald <h.rei...@thelounge.net> >>> Sent: Wednesday, December 15, 2021 8:44 AM >>> To: bind-users@lists.isc.org >>> Subject: Re: Millions of './ANY/IN' queries denied >>> >>> >>> >>> Am 15.12.21 um 14:33 schrieb Andrew P.: >>>> So why isn't there a way to tell BIND not to respond to queries for which >>>> it clearly is not authoritative (such as these attack vectors)? Since no >>>> legitimate resolver would be asking a non-authoritative server for >>>> information, why should his (or my) public BIND server respond to these >>>> even with an error message? >>> >>> because in case of UDP it would make things much worser >>> >>> how do the client smell that you didn't respond by purpose and distinct >>> it from packet loss leading to retries? >>> >>> ------------------ >>> >>> "Since no legitimate resolver would be asking a non authoritative server >>> for information" isn't true at all >>> >>> years ago we moved a server to a different location and all sorts of ISP >>> resolvers did respond with old IPs months later, the dumbest one even >>> played lottery responding 50% old and 50% new IP >>> >>> i found that out by random complaints because one domain had 60 count >>> subdomains and started to query all open rsolvers i was able to find >>> with script's - a tragedy >>> >>> that machine was sadly the primary NS for 800 domains and over the >>> months the old ip could have been ru-used for a new customer running a >>> nameserver for completly different domains >>> >>> ------------------ >>> >>> long story short: no sane service should supress replies completly >>> unless a explicit blacklist saying so is involved >>> >>>> ________________________________________ >>>> From: bind-users <bind-users-boun...@lists.isc.org> on behalf of Ondřej >>>> Surý <ond...@isc.org> >>>> Sent: Wednesday, December 15, 2021 7:18 AM >>>> To: Danilo Godec >>>> Cc: bind-users@lists.isc.org >>>> Subject: Re: Millions of './ANY/IN' queries denied >>>> >>>>> Would I be doing a bad thing by using fail2ban to block these IPs? >>>> >>>> That’s the question that only you can answer. The IP addresses are >>>> not attacker’s but victim’s and you would be punishing those networks >>>> by blocking access from them to your network. >>>> >>>> Do you absolutely know that these IP addresses doesn’t need access >>>> to your DNS? If yes, then go ahead. > _______________________________________________ > Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe > from this list > > ISC funds the development of this software with paid support subscriptions. > Contact us at https://www.isc.org/contact/ for more information. > > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users _______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users