To begin, restrict access from outside using standard Unbound configuration (example from one of my setups):

    access-control: 0.0.0.0/0 refuse
    access-control: 127.0.0.0/8 allow_snoop
    access-control: 192.168.0.0/16 allow_snoop
    access-control: 172.16.0.0/12 allow_snoop
    access-control: ::0/0 refuse
    access-control: ::1 allow
    access-control: ::ffff:127.0.0.1 allow

Additionally, cut off external access with a server firewall and/or on the border. And finally, check the internal network to see if it is trooped.

24.03.2025 15:18, sir izake via Unbound-users пишет:
Hi

I run an unbound dns cache resolver (version 1.22.0) on a freebsd 14.2 server. It is configured to only respond to queries from the local host and my network IP block.

Recently, I detected my server was involved in a DNS amplification attack.  By default unbound doesn't respond to any query outside those allowed in the access list in the config file. How do I uncover the source IPs involved and potentially block them.

Are there other options I need to enable to prevent further amplification attacks?

I have checked the server and don't see any suspicious process running.

Your support and advice is greatly appreciated.

Regards
izake

Reply via email to