Hello:

Tom Eastep wrote:
> I've place my DNSDDOS action files at
> http://www.shorewall.net/pub/shorewall/contrib/DNSDDOS/. See the
> aaREADME.txt file.
> 
> Shorewall-perl users should be able to use it as-is.

The filter seems to be working well. But I've still seem some sporadic
        client 213.61.92.192#23951: query (cache) './NS/IN' denied
in my logfile.

I did some investigation and found that the hexstring is a bit different 
than what is in your rule. Here is a comparison:

Your: 0100 0001 0000 0000 0000 0000 0200 01
Mine: 0000 0001 0000 0000 0000 0000 0200 01
        ^
        Difference

As per Wireshark, your rule is looking for a recursive query, while the 
packets I've been seeing are looking for a non-recursive query.

Questions: is what I'm seeing another variant of the DNSDDOS attack, or 
am I maybe seeing these for some legitimate reason?

Thanks for any input you have, and thanks for a great product!

-- 
Brian Schang

------------------------------------------------------------------------------
Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA
-OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise
-Strategies to boost innovation and cut costs with open source participation
-Receive a $600 discount off the registration fee with the source code: SFAD
http://p.sf.net/sfu/XcvMzF8H
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to