Re: Bind vs flood

2014-02-28 Thread Dmitry Rybin
On 27.02.2014 09:59, Dmitry Rybin wrote: Bind answers with Server failure. On high load (4 qps) all normal client can get Servfail on good query. Or query can execute more 2-3 second. I have an a mistake, 4'000 QPS. ___ Please visit

Re: Bind vs flood

2014-02-28 Thread Peter Andreev
Well, at first glance it looks like malicious activity, so the best action is to call all users, suspected in sending such requests, and warn them. The fast and very (very-very-very) dirty solution is to set up zone 84822258.com http://niqcs.www.84822258.com on your resolver. This should supress

Re: Bind vs flood

2014-02-28 Thread Peter Andreev
However, if you choose the second action, then your tech support should be ready. 2014-02-28 13:36 GMT+04:00 Peter Andreev andreev.pe...@gmail.com: Well, at first glance it looks like malicious activity, so the best action is to call all users, suspected in sending such requests, and warn

RE: Bind vs flood

2014-02-28 Thread Jason Brown
-bounces+jason.brown=kcom@lists.isc.org] On Behalf Of Peter Andreev Sent: 28 February 2014 09:36 To: Dmitry Rybin Cc: BIND Users Mailing List Subject: Re: Bind vs flood Well, at first glance it looks like malicious activity, so the best action is to call all users, suspected in sending

Re: Bind vs flood

2014-02-28 Thread Ivo
: Bind vs flood Well, at first glance it looks like malicious activity, so the best action is to call all users, suspected in sending such requests, and warn them. The fast and very (very-very-very) dirty solution is to set up zone 84822258.com http://niqcs.www.84822258.com on your resolver

RE: Bind vs flood

2014-02-28 Thread Jason Brown
To: bind-users@lists.isc.org Subject: Re: Bind vs flood RPZ cannot rewrite servfail, it is designed to replace a valid response. On 2/28/14 11:42 AM, Jason Brown wrote: Isn't this where RPZ comes in? Using RPZ means it is quicker and easier to null amplification, also easier to remove if you do

Re: Bind vs flood

2014-02-28 Thread Chris Buxton
: Re: Bind vs flood Well, at first glance it looks like malicious activity, so the best action is to call all users, suspected in sending such requests, and warn them. The fast and very (very-very-very) dirty solution is to set up zone 84822258.com on your resolver. This should supress

RE: Bind vs flood

2014-02-28 Thread Jason Brown
LAB'd this and am always happy to be wrong as it means I have learnt something new! :) From: Chris Buxton [cli...@buxtonfamily.us] Sent: 28 February 2014 17:57 To: Jason Brown Cc: Ivo; BIND Users Subject: Re: Bind vs flood On Feb 28, 2014, at 2:12 AM, Jason Brown

Re: Bind vs flood

2014-02-28 Thread Cathy Almond
On 28/02/2014 17:57, Chris Buxton wrote: On Feb 28, 2014, at 2:12 AM, Jason Brown jason.br...@kcom.com mailto:jason.br...@kcom.com wrote: But, it will respond with a valid response (your choice) and therefore not create a servfail due to trying.. that’s my point. ** Nope. RPZ only

RE: Bind vs flood

2014-02-28 Thread Phil Mayers
I think Chris is right here. IIRC even qname policies perform an upstream query - we've seen this reflected in response times. I don't know what it does for servfail but it would certainly be reasonable to pass them unchanged. Remember rpz is deliberately limited. -- Sent from my phone with,

Re: Bind vs flood

2014-02-28 Thread Evan Hunt
On Fri, Feb 28, 2014 at 09:38:23PM +, Phil Mayers wrote: I think Chris is right here. IIRC even qname policies perform an upstream query - we've seen this reflected in response times. I don't know what it does for servfail but it would certainly be reasonable to pass them unchanged.

Re: Bind vs flood

2014-02-28 Thread Phil Mayers
As Cathy mentioned, it's possible to bypass the recursion in RPZ now. The feature is in the rpz2 patches, which are included with BIND 9.10 and are also built into some packaged versions of BIND. So I just saw. I hadn't spotted that this was in the rpz2 patches; potentially quite useful. --

Re: Bind vs flood

2014-02-27 Thread Ivo
Hi Dmitry, We observed that similar requests are landing on our cache resolver mostly from various home routers running dns server as open resolver and that also masquerades the original request source. We have a collection of ~60 domains involved and most of them are related to China. The

Re: Bind vs flood

2014-02-27 Thread Ben Croswell
I guess I am missing why anyone on the internet should be able to open queries against your caching resolver. Why would in bound queries be allowed to servers that are for your people to get out? On Feb 27, 2014 10:13 AM, Ivo i...@nic.lv wrote: Hi Dmitry, We observed that similar requests

Re: Bind vs flood

2014-02-27 Thread Sten Carlsen
Doesn't this look like a DDOS attack on the spoofed origin of the queries? On 27/02/14 16:18, Ben Croswell wrote: I guess I am missing why anyone on the internet should be able to open queries against your caching resolver. Why would in bound queries be allowed to servers that are for your

Re: Bind vs flood

2014-02-27 Thread Ivo
Ben, No, our server is not an open resolver, we have a large user community and the problem is that users install their own wifi box like Zyxel or similar which may have open resolver by default. Ivo On 2/27/14 5:18 PM, Ben Croswell wrote: I guess I am missing why anyone on the internet

Re: Bind vs flood

2014-02-27 Thread Ben Croswell
Ah I see you are in provider situation. Shows my assumption you were in an enclosed enterprise environment. On Feb 27, 2014 10:57 AM, Ivo i...@nic.lv wrote: Ben, No, our server is not an open resolver, we have a large user community and the problem is that users install their own wifi box

Re: Bind vs flood

2014-02-26 Thread Peter Andreev
Hi Dmitry, If your problem is a lot of strange queries, then there is two ways: 1. You operate an open resolver. If you can - restrict it to a limited scope of clients, otherwise the only way you can lower number of incoming queries is DPI; 2. You operate a non-open resolver. Then you can find