>> 3. Do you block >512 Bytes DNS requests? How many > 512 byte DNS requests are people seeing?
Perhaps the requester meant > 512 byte DNS responses? Blocking > 512 byte responses would be ... unfortunate. >> 4. Do you block non-UDP DNS requests or rate-limit requests? > Yes I presume (hope) the "yes" applies rate limiting? Blocking non-UDP DNS is a bad idea. As RFC 5966 states: "... it should be noted that failure to support TCP (or the blocking of DNS over TCP at the network layer) may result in resolution failure and/or application-level timeouts." > block anycast/broadcast source address packets How do you know if a source address is an anycast address? > block fragmented packets Why would you want to block fragmented packets? Regards, -drc
signature.asc
Description: Message signed with OpenPGP using GPGMail

