on the dns front, i've found that some spam senders are
arranging things so that the guys doing reverse-lookup
validataion will get 192.168 or 10. addresses.  for some reason
arin doesn't return an address for a query on 10.in-addr.arpa
or 168.192.in-addr.arpa, so dns will loop from the top and never
time out.

this doesn't fix the problem, but it will stop these kinds of queries in
their tracks.  add to /lib/ndb/$myrecursiveserver:

# 
# spam defense.  unfortunately, arin doesn't give negative
# rcodes for these non-routable addresses.  we'll do it for
# them
#
dom=168.192.in-addr.arpa soa=
        refresh=3600 ttl=3600
        ns=ns1.MY.DOM
        ns=ns2.MY.DOM

dom=10.in-addr.arpa soa=
        refresh=3600 ttl=3600
        ns=ns1.MY.DOM
        ns=ns2.MY.DOM

- erik

Reply via email to