Bind vs flood

Peter Andreev andreev.peter at gmail.com
Fri Feb 28 09:40:57 UTC 2014


However, if you choose the second action, then your tech support should be
ready.


2014-02-28 13:36 GMT+04:00 Peter Andreev <andreev.peter at gmail.com>:

> Well, at first glance it looks like malicious activity, so the best action
> is to call all users, suspected in sending such requests, and warn them.
> The fast and very (very-very-very) dirty solution is to set up zone
> 84822258.com <http://niqcs.www.84822258.com> on your resolver. This
> should supress outgoing queries and thus minimize resolving time.
>
>
> 2014-02-28 12:06 GMT+04:00 Dmitry Rybin <kirgudu at corbina.net>:
>
> On 27.02.2014 09:59, Dmitry Rybin wrote:
>>
>>  Bind answers with "Server failure". On high load (4 qps) all normal
>>> client can get Servfail on good query. Or query can execute more 2-3
>>> second.
>>>
>>
>> I have an a mistake, 4'000 QPS.
>>
>> _______________________________________________
>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
>> unsubscribe from this list
>>
>> bind-users mailing list
>> bind-users at lists.isc.org
>> https://lists.isc.org/mailman/listinfo/bind-users
>>
>
>
>
> --
> Is there any problem Exterminatus cannot solve? I have not found one yet.
>
>


-- 
Is there any problem Exterminatus cannot solve? I have not found one yet.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20140228/e4bbf612/attachment.html>


More information about the bind-users mailing list