Re: lame-servers: error (FORMERR) resolving [something]

2013-01-14 Thread Leonard Mills
Packet dumps at your edge would likely be helpful to your diagnosis. At your firewall (or other edge appliance) you are seeing successful UDP from a high port on your system (DNS client) to port 53 on the server and a reply in the opposite direction.  You are not seeing success from an external

Re: How to Limit DNS Request per ip source ?

2013-01-14 Thread Beavis
Just put an ACL filter on your bind config for recursive queries. this will make your dns less susceptible to flash-crowd type attacks. Cisco has a short document about this. http://www.cisco.com/web/about/security/intelligence/dns-bcp.html just check out the bind-centric info. discard the rest.

Re: How to Limit DNS Request per ip source ?

2013-01-14 Thread Stephane Bortzmeyer
On Mon, Jan 14, 2013 at 06:36:44PM +0530, Gaurav Kansal wrote a message of 156 lines which said: > I tried the following commands, but unfortunately didn't succeed. Why do you want to limit? If it is against a DoS attack, I warn you that most Netfilter modules (for instance, "state") require

How to Limit DNS Request per ip source ?

2013-01-14 Thread Gaurav Kansal
Dear All, I want to limit the dns request per ip source through iptables. I tried the following commands, but unfortunately didn't succeed. -A RH-Firewall-1-INPUT -m udp -p udp --dport 53 -m state --state NEW -m recent --set --name DNSQF --rsource -A RH-Firewall-1-INPUT -m udp -p udp

Re: lame-servers: error (FORMERR) resolving [something]

2013-01-14 Thread Shane Kerr
Daniele, It may be a simple case of your firewall not allowing any DNS queries that do not request recursion. Difficult to know. You may want to try: dig +trace www.isc.org This will follow the referrals from the root, and you can verify that this works. The next step may be to try: dig +trac

Re: lame-servers: error (FORMERR) resolving [something]

2013-01-14 Thread Daniele
What tests should I do? If I query directly an external name-server (one of the root ones or 8.8.8.8 for example) I receive the correct response. For this reason I'm inclined to think that the router doesn't block packets to/from port 53. Why should it block packets generated by BIND9? 2013/1/12