On Thu, 31 Jan 2013, Cliff Stanford wrote:

Just before 09:00 this morning we saw a 100 Mbps port saturated. Upon investigation the traffic appears to be DNS responses to requests that were never made.

Is this a known DDoS attack, it's a new one on me? Any suggestions on how to deal it?

Yes we had such an attack against one of our customers a few weeks ago.
Depending on how distributed the attack is, you may be able to filter traffic on the host/firewall as the attack traffic will probably involve a lot more traffic from certain hosts than others. Also others suggested that if you're using BIND, some rate limiting modules can be effective, or consider another DNS server daemon in the longer term which can cope better with it.

seb


Reply via email to