Re: issue of Amplification attack

2020-07-12 Thread Michael De Roover
There was a very interesting conversation about this last week. See https://www.mail-archive.com/bind-users@lists.isc.org/msg29187.html. On 7/12/20 6:23 AM, ShubhamGoyal wrote: Dear sir, Thank you  for give me answer for my previous question,  Sir now we are suffer fro

Re: issue of Amplification attack

2020-07-12 Thread Matus UHLAR - fantomas
On 7/12/20 6:23 AM, ShubhamGoyal wrote: Thank you  for give me answer for my previous question,  Sir now we are suffer from amplification attack so is there any method in bind to stop DNS Amplification attack. I am thinking to stop or drop ANY type queries from our DNS

Re: issue of Amplification attack

2020-07-12 Thread @lbutlr
On 12 Jul 2020, at 06:28, Matus UHLAR - fantomas wrote: >> On 7/12/20 6:23 AM, ShubhamGoyal wrote: >>> I am thinking to stop or drop ANY type queries from our DNS Recursive >>> resolver , so please tell me how can we drop or stop ANY type queries from >>> bind. Don't do this. > On 12.07.20 12:

Re: your mail

2020-07-12 Thread @lbutlr
On 28 Jun 2020, at 09:13, Matus UHLAR - fantomas wrote: >> zone "abc.com" { >> type forward; >> forwarders {1.1.1.1;}; > > of 1.1.1.1 is IP of nameserver for abc.com, you should better configure it > as "type stub" or "type static-stub". 1.1.1.1 is a DNS resolver for Cloudflare and r

scripts-to-block-domains

2020-07-12 Thread MEjaz
Hell all, I have an requirement from our national Cyber security to block several thousand forged domains from our recursive servers, Is there any way we can add clause in named.conf to scan such bogus domain list without impacting the performance of the servers. Thanks in advance..