limiting number of requests of a single hosts
wim.holemans at ua.ac.be
Fri Jun 15 15:06:43 UTC 2012
Yes we know and new firewalls are on their way (already partly installed), but we can't activate them for the moment as we are in an examination period in which we can't make any change to our network as students should be able to take online tests 24/24...
Netwerkdienst Universiteit Antwerpen
Network Services University of Antwerp
From: Fajar A. Nugraha [mailto:work at fajar.net]
Sent: vrijdag 15 juni 2012 17:02
To: Holemans Wim
Cc: bind-users at lists.isc.org
Subject: Re: limiting number of requests of a single hosts
On Fri, Jun 15, 2012 at 9:37 PM, Holemans Wim <wim.holemans at ua.ac.be> wrote:
> Wim Holemans
> Netwerkdienst Universiteit Antwerpen
> Network Services University of Antwerp
> One of the problems is that these firewalls are going to be replaced soon and we don't want to spend to much effort in trying to fix what seems an annoying side-effect of something caused by a DNS system.
You DO realize that DNS is (mostly) UDP packets, and an attacker (or in your case, the ADs) can simply send UDP packet floods to kill your firewall (in your current state), regardless how your DNS server is configured, even when the DNS server is down?
More information about the bind-users