Am 16.12.21 um 15:29 schrieb Andrew P.:
Reindl Harald <h.rei...@thelounge.net> writes:
Am 16.12.21 um 14:56 schrieb Andrew P.:
Reindl Harald <h.rei...@thelounge.net> writes:
Am 16.12.21 um 14:22 schrieb Andrew P.:
You don't understand what kind of blacklist I want; I want to blacklist the 
domain name
being asked for, so I don't answer for it. I'm not looking to blacklist forged 
IP addresses
of requestors (since we all know criminals don't use their own identities; they 
use the
identities of innocent bystanders).

Again, why should _my_ nameserver_ respond to a query for "./ANY/IN"? I am not 
a rootserver, and never will be.

AGAIN: you don't gain anything by not responding on a UDP protocol
because the client can't distinct no response and packet loss

AGAIN, the criminal DDoS attacker who's creating these forged requests isn't 
looking for replies to themselves

but a legit client does while these attacks aren't successful at all

And you still haven't told me who would be a legitimate client making that 
request for the
root domain from my nameserver. Frankly, I can't think of _anyone_ who should 
be making
that request of my nameserver.

it's an example where you introduce more troubles than you solve problems when things go bad

they're looking to abuse some poor victim. And the victim can't make the 
attacker shut up

this attacker must be pretty dumb then because the ANY request makes
only sense if it get answered and the response is magnitudes larger then
the request

Not if the attacker has a huge bot-net to make the requests. He doesn't care 
how much of
the bots' network capacity is used up, since the attacker isn't paying for it.

but it makes not sense playing that over your server instead blow the traffic directly out

And, based on the same
philosophy as spam, if they hit enough name servers, some of them will be 
insecure and provide the
full response
still pretty dumb not testing with a single ANY request if you would respond

I suspect they do know what they are doing, or they wouldn't be wasting their
time doing it

"know what they are doing" muste be also the reason why i have a ton of hardcoded spam-subjects with specific typos for over 10 years and even respond that i don't like the sobject on the MX

pretty sure the original idea was not hitting a specific real word but after all that years a famous typo is a 100% spam sign

they don't waste their time but blow out every sort of nonsense in the hope someone is hitted by it, your server is immune to what they try, no problem exists
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to