On Jan 20, 2009, at 5:44 PM, Mark Andrews wrote:

In message <232b45f8-acd3-427a-95e9-bc3ca5fc9...@newgeo.com>, Scott Haneda writ
es:
Hello, looking at my logs today, I am getting hammered with these:
20-Jan-2009 15:39:06.284 security: info: client 66.230.160.1#48517:
query (cache) './NS/IN' denied
20-Jan-2009 15:39:06.790 security: info: client 66.230.128.15#31593:
query (cache) './NS/IN' denied

Repeated over and over, how do I tell what they are, and if they are
bad, what is the best way to block them?
--
Scott

        You should talk to your ISP to chase the traffic back to
        its source and get BCP 38 implemented there.  BCP 38 is ~10
        years old now.  There is no excuse for not filtering spoofed
        traffic.

        If the source doesn't want to implement BCP 38 then de-peering
        the source should be considered.


Is BCP 38 really as solid and plug and play as it sounds? In a shared, or colo'd environment, can that ISP really deploy something like this, without it causing trouble for those that assume unfettered inbound and outbound traffic to their servers?
--
Scott

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to