von Dein, Thomas <thomas.vond...@f-i-ts.de> wrote:
>
> we're seeing a lot of malformed dns queries to our recursive nameservers
> like these:

[snip queries for notification. / antivirusix. / kubeinspect. /
organization. / history. / go-kms. ]

> Obviously these clients (there are many) are misconfigured in some weird
> way. But sometimes they send valid queries. So, what I'd like to do is
> to throttle them down somehow when they start to send these queries. And
> I only want to do this for clients in this specific source network, not
> for all.

Response rate limiting (RRL) does something roughly like what you want: it
suppresses answers to repeated queries. However it is designed to deal
with abusive traffic with spoofed source addresses, whereas your problem
traffic is legitimate.

https://ftp.isc.org/isc/bind9/cur/9.16/doc/arm/Bv9ARM.ch05.html#rrl

You should be extremely wary of rate-limiting non-abuse traffic on a
recursive server, because it can cause some very hard-to-debug problems,
e.g. your queries look vaguely cloud-flavoured which reminds me of
https://www.awsadvent.com/2018/12/07/working-with-aws-limits/

A better approach might be to find the people who aren't configuring their
systems with a default domain name or search path, and gently teach them
the error of their ways :-)

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
Forties: Cyclonic becoming northwest 5 or 6. Moderate or rough. Wintry
showers. Good.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to