> > to that end, vernon schryver and i have been exploring rate 
> limiting in
> > BIND 9. there's a patch available, which i've so far offered only to
> > anyone whose server is currently getting abused. what i'm 
great.

> > config {
> >     // ...
> >         rate-limit {
> >                 responses-per-second 5;
> >                 window 5;
> >         };
> > };
> 
> I'm afraid we may need more control. If my clients are 
> generating a DDoS
> attack at 20 responses per second, and I limit this to 5 per second -
> the C&C can get the same effect by mobilizing four times as 
> many clients
> to do the job. On my wishlist, in addition to rate limiting, is also:
> 
> - Some way of dynamically blackholing clients, based on one or more of
> -- Rate limit exceeded
> -- Asking the *same* question (with a large response) repeatedly
> -- Asking a *specific* question (e.g. ANY isc.org|ripe.net)
> -- Input from an external system, e.g. via rndc
What about rate limiting clients which are not keeping the TTL value?
We are talking about rate limiting on authoritative name servers, right?

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to