On 12.09.2012 11:06, Simon Munton wrote:
We've been seeing 1000's of ANY queries/sec for many months, but use RRL
to filter them, so haven't been too bothered - mostly hitting our Tokyo
node.

http://stats.cdns.net/public/0.0.0.1/D4AE52-BBA337.html

But I can confirm we ARE getting the same pattern in the port & ID

I'm thinking a rate limiter in iptables using -u32 should be possible.


One thing we did notice was they use an impressively wide range of
different domain names in their queries, leading us to wonder if it is
just a simple reflection attack.

I also wondered if maybe it is just a legitimate user trying to "mirror" the DNS. But todays most seen source on our DNS servers is 113.21.221.21 which is assinged to nexusguard.com which "protects E-Business from DDoS attacks". This makes me believe that it is an amplification attack.

regards
Klaus
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to